Raspbian Package Auto-Building

Build log for nss (2:3.26-1+debu7u3) on armhf

nss2:3.26-1+debu7u3armhf → 2017-05-19 20:00:41

sbuild (Debian sbuild) 0.71.0 (24 Aug 2016) on testbuildd.raspbian.org

+==============================================================================+
| nss 2:3.26-1+debu7u3 (armhf)                 Fri, 19 May 2017 16:13:56 +0000 |
+==============================================================================+

Package: nss
Version: 2:3.26-1+debu7u3
Source Version: 2:3.26-1+debu7u3
Distribution: wheezy-staging
Machine Architecture: armhf
Host Architecture: armhf
Build Architecture: armhf

I: NOTICE: Log filtering will replace 'var/lib/schroot/mount/wheezy-staging-armhf-sbuild-c1a4902b-74b6-4b2b-a24d-1db77c5e16ed' with '<<CHROOT>>'

+------------------------------------------------------------------------------+
| Update chroot                                                                |
+------------------------------------------------------------------------------+

Get:1 http://172.17.0.1 wheezy-staging Release.gpg [473 B]
Get:2 http://172.17.0.1 wheezy-staging Release [10.8 kB]
Get:3 http://172.17.0.1 wheezy-staging/main Sources [6093 kB]
Get:4 http://172.17.0.1 wheezy-staging/main armhf Packages [7679 kB]
Fetched 13.8 MB in 22s (603 kB/s)
Reading package lists...

+------------------------------------------------------------------------------+
| Fetch source files                                                           |
+------------------------------------------------------------------------------+


Check APT
---------

Checking available source versions...

Download source files with APT
------------------------------

Reading package lists...
Building dependency tree...
NOTICE: 'nss' packaging is maintained in the 'Git' version control system at:
https://anonscm.debian.org/git/pkg-mozilla/nss.git
Need to get 7429 kB of source archives.
Get:1 http://172.17.0.1/private/ wheezy-staging/main nss 2:3.26-1+debu7u3 (dsc) [1919 B]
Get:2 http://172.17.0.1/private/ wheezy-staging/main nss 2:3.26-1+debu7u3 (tar) [7387 kB]
Get:3 http://172.17.0.1/private/ wheezy-staging/main nss 2:3.26-1+debu7u3 (diff) [40.3 kB]
Fetched 7429 kB in 2s (2825 kB/s)
Download complete and in download only mode
I: NOTICE: Log filtering will replace 'build/nss-33qS8y/nss-3.26' with '<<PKGBUILDDIR>>'
I: NOTICE: Log filtering will replace 'build/nss-33qS8y' with '<<BUILDDIR>>'

+------------------------------------------------------------------------------+
| Install build-essential                                                      |
+------------------------------------------------------------------------------+


Setup apt archive
-----------------

Merged Build-Depends: build-essential, fakeroot
Filtered Build-Depends: build-essential, fakeroot
dpkg-deb: building package `sbuild-build-depends-core-dummy' in `/<<BUILDDIR>>/resolver-MhbR6h/apt_archive/sbuild-build-depends-core-dummy.deb'.
dpkg-scanpackages: warning: Packages in archive but missing from override file:
dpkg-scanpackages: warning:   sbuild-build-depends-core-dummy
dpkg-scanpackages: info: Wrote 1 entries to output Packages file.
gpg: keyring `/<<BUILDDIR>>/resolver-MhbR6h/gpg/secring.gpg' created
gpg: keyring `/<<BUILDDIR>>/resolver-MhbR6h/gpg/pubring.gpg' created
gpg: /<<BUILDDIR>>/resolver-MhbR6h/gpg/trustdb.gpg: trustdb created
gpg: key 34E39F26: public key "Sbuild Signer (Sbuild Build Dependency Archive Key) <buildd-tools-devel@lists.alioth.debian.org>" imported
gpg: Total number processed: 1
gpg:               imported: 1  (RSA: 1)
gpg: key 34E39F26: secret key imported
gpg: key 34E39F26: "Sbuild Signer (Sbuild Build Dependency Archive Key) <buildd-tools-devel@lists.alioth.debian.org>" not changed
gpg: Total number processed: 1
gpg:              unchanged: 1
gpg:       secret keys read: 1
gpg:   secret keys imported: 1
Get:1 copy: ./ Release.gpg [316 B]
Get:2 copy: ./ Release [957 B]
Get:3 copy: ./ Sources [350 B]
Get:4 copy: ./ Packages [431 B]
Fetched 2054 B in 0s (21.9 kB/s)
Reading package lists...
Reading package lists...

Install core build dependencies (apt-based resolver)
----------------------------------------------------

Installing build dependencies
Reading package lists...
Building dependency tree...
The following NEW packages will be installed:
  sbuild-build-depends-core-dummy
0 upgraded, 1 newly installed, 0 to remove and 19 not upgraded.
Need to get 704 B of archives.
After this operation, 0 B of additional disk space will be used.
Get:1 copy:/<<BUILDDIR>>/resolver-MhbR6h/apt_archive/ ./ sbuild-build-depends-core-dummy 0.invalid.0 [704 B]
debconf: delaying package configuration, since apt-utils is not installed
Fetched 704 B in 0s (0 B/s)
Selecting previously unselected package sbuild-build-depends-core-dummy.
(Reading database ... 11317 files and directories currently installed.)
Unpacking sbuild-build-depends-core-dummy (from .../sbuild-build-depends-core-dummy_0.invalid.0_armhf.deb) ...
Setting up sbuild-build-depends-core-dummy (0.invalid.0) ...

+------------------------------------------------------------------------------+
| Check architectures                                                          |
+------------------------------------------------------------------------------+

Arch check ok (armhf included in any)

+------------------------------------------------------------------------------+
| Install package build dependencies                                           |
+------------------------------------------------------------------------------+


Setup apt archive
-----------------

Merged Build-Depends: debhelper (>= 9), dpkg-dev (>= 1.16.1.1~), libnspr4-dev (>= 2:4.12), zlib1g-dev, libsqlite3-dev (>= 3.3.9), gcc-4.7, g++-4.7
Filtered Build-Depends: debhelper (>= 9), dpkg-dev (>= 1.16.1.1~), libnspr4-dev (>= 2:4.12), zlib1g-dev, libsqlite3-dev (>= 3.3.9), gcc-4.7, g++-4.7
dpkg-deb: building package `sbuild-build-depends-nss-dummy' in `/<<BUILDDIR>>/resolver-MhbR6h/apt_archive/sbuild-build-depends-nss-dummy.deb'.
dpkg-scanpackages: warning: Packages in archive but missing from override file:
dpkg-scanpackages: warning:   sbuild-build-depends-core-dummy sbuild-build-depends-nss-dummy
dpkg-scanpackages: info: Wrote 2 entries to output Packages file.
Get:1 copy: ./ Release.gpg [316 B]
Get:2 copy: ./ Release [963 B]
Get:3 copy: ./ Sources [543 B]
Get:4 copy: ./ Packages [623 B]
Fetched 2445 B in 0s (26.0 kB/s)
Reading package lists...
Reading package lists...

Install nss build dependencies (apt-based resolver)
---------------------------------------------------

Installing build dependencies
Reading package lists...
Building dependency tree...
Reading state information...
The following extra packages will be installed:
  bsdmainutils cpp-4.7 debhelper file g++-4.7 gcc-4.7 gettext gettext-base
  groff-base html2text intltool-debian libasprintf0c2 libcroco3 libffi5
  libgettextpo0 libglib2.0-0 libmagic1 libnspr4 libnspr4-dev libpcre3
  libpipeline1 libsqlite3-0 libsqlite3-dev libstdc++6-4.7-dev libunistring0
  libxml2 man-db po-debconf zlib1g-dev
Suggested packages:
  wamerican wordlist whois vacation gcc-4.7-locales dh-make gcc-4.7-doc
  libstdc++6-4.7-dbg libmudflap0-4.7-dev libgcc1-dbg libgomp1-dbg libitm1-dbg
  libquadmath-dbg libmudflap0-dbg libcloog-ppl0 libppl-c2 libppl7
  binutils-gold gettext-doc groff sqlite3-doc libstdc++6-4.7-doc less
  www-browser libmail-box-perl
Recommended packages:
  curl wget lynx-cur autopoint libglib2.0-data shared-mime-info xml-core
  libmail-sendmail-perl
The following NEW packages will be installed:
  bsdmainutils cpp-4.7 debhelper file g++-4.7 gcc-4.7 gettext gettext-base
  groff-base html2text intltool-debian libasprintf0c2 libcroco3 libffi5
  libgettextpo0 libglib2.0-0 libmagic1 libnspr4 libnspr4-dev libpcre3
  libpipeline1 libsqlite3-0 libsqlite3-dev libstdc++6-4.7-dev libunistring0
  libxml2 man-db po-debconf sbuild-build-depends-nss-dummy zlib1g-dev
0 upgraded, 30 newly installed, 0 to remove and 19 not upgraded.
Need to get 27.7 MB of archives.
After this operation, 74.2 MB of additional disk space will be used.
Get:1 copy:/<<BUILDDIR>>/resolver-MhbR6h/apt_archive/ ./ sbuild-build-depends-nss-dummy 0.invalid.0 [764 B]
Get:2 http://172.17.0.1/private/ wheezy-staging/main libpcre3 armhf 1:8.30-5 [242 kB]
Get:3 http://172.17.0.1/private/ wheezy-staging/main libpipeline1 armhf 1.2.1-1 [35.0 kB]
Get:4 http://172.17.0.1/private/ wheezy-staging/main libasprintf0c2 armhf 0.18.1.1-9 [26.4 kB]
Get:5 http://172.17.0.1/private/ wheezy-staging/main libmagic1 armhf 5.11-2+deb7u9 [201 kB]
Get:6 http://172.17.0.1/private/ wheezy-staging/main libsqlite3-0 armhf 3.7.13-1+deb7u3 [414 kB]
Get:7 http://172.17.0.1/private/ wheezy-staging/main libxml2 armhf 2.8.0+dfsg1-7+wheezy7 [826 kB]
Get:8 http://172.17.0.1/private/ wheezy-staging/main libffi5 armhf 3.0.10-3+b3 [22.9 kB]
Get:9 http://172.17.0.1/private/ wheezy-staging/main libglib2.0-0 armhf 2.33.12+really2.32.4-5 [1689 kB]
Get:10 http://172.17.0.1/private/ wheezy-staging/main libcroco3 armhf 0.6.6-2+deb7u1 [119 kB]
Get:11 http://172.17.0.1/private/ wheezy-staging/main libunistring0 armhf 0.9.3-5 [408 kB]
Get:12 http://172.17.0.1/private/ wheezy-staging/main libgettextpo0 armhf 0.18.1.1-9 [130 kB]
Get:13 http://172.17.0.1/private/ wheezy-staging/main libnspr4 armhf 2:4.12-1+deb7u1 [118 kB]
Get:14 http://172.17.0.1/private/ wheezy-staging/main bsdmainutils armhf 9.0.3 [207 kB]
Get:15 http://172.17.0.1/private/ wheezy-staging/main groff-base armhf 1.21-9 [1071 kB]
Get:16 http://172.17.0.1/private/ wheezy-staging/main man-db armhf 2.6.2-1 [1027 kB]
Get:17 http://172.17.0.1/private/ wheezy-staging/main file armhf 5.11-2+deb7u9 [53.2 kB]
Get:18 http://172.17.0.1/private/ wheezy-staging/main gettext-base armhf 0.18.1.1-9 [138 kB]
Get:19 http://172.17.0.1/private/ wheezy-staging/main cpp-4.7 armhf 4.7.2-5+rpi1 [4762 kB]
Get:20 http://172.17.0.1/private/ wheezy-staging/main html2text armhf 1.3.2a-15 [98.5 kB]
Get:21 http://172.17.0.1/private/ wheezy-staging/main gettext armhf 0.18.1.1-9 [1879 kB]
Get:22 http://172.17.0.1/private/ wheezy-staging/main intltool-debian all 0.35.0+20060710.1 [29.8 kB]
Get:23 http://172.17.0.1/private/ wheezy-staging/main po-debconf all 1.0.16+nmu2 [223 kB]
Get:24 http://172.17.0.1/private/ wheezy-staging/main debhelper all 9.20120909 [705 kB]
Get:25 http://172.17.0.1/private/ wheezy-staging/main gcc-4.7 armhf 4.7.2-5+rpi1 [5327 kB]
Get:26 http://172.17.0.1/private/ wheezy-staging/main libstdc++6-4.7-dev armhf 4.7.2-5+rpi1 [1750 kB]
Get:27 http://172.17.0.1/private/ wheezy-staging/main g++-4.7 armhf 4.7.2-5+rpi1 [5166 kB]
Get:28 http://172.17.0.1/private/ wheezy-staging/main libnspr4-dev armhf 2:4.12-1+deb7u1 [254 kB]
Get:29 http://172.17.0.1/private/ wheezy-staging/main libsqlite3-dev armhf 3.7.13-1+deb7u3 [537 kB]
Get:30 http://172.17.0.1/private/ wheezy-staging/main zlib1g-dev armhf 1:1.2.7.dfsg-13 [212 kB]
debconf: delaying package configuration, since apt-utils is not installed
Fetched 27.7 MB in 13s (2021 kB/s)
Selecting previously unselected package libpcre3:armhf.
(Reading database ... 11317 files and directories currently installed.)
Unpacking libpcre3:armhf (from .../libpcre3_1%3a8.30-5_armhf.deb) ...
Selecting previously unselected package libpipeline1:armhf.
Unpacking libpipeline1:armhf (from .../libpipeline1_1.2.1-1_armhf.deb) ...
Selecting previously unselected package libasprintf0c2:armhf.
Unpacking libasprintf0c2:armhf (from .../libasprintf0c2_0.18.1.1-9_armhf.deb) ...
Selecting previously unselected package libmagic1:armhf.
Unpacking libmagic1:armhf (from .../libmagic1_5.11-2+deb7u9_armhf.deb) ...
Selecting previously unselected package libsqlite3-0:armhf.
Unpacking libsqlite3-0:armhf (from .../libsqlite3-0_3.7.13-1+deb7u3_armhf.deb) ...
Selecting previously unselected package libxml2:armhf.
Unpacking libxml2:armhf (from .../libxml2_2.8.0+dfsg1-7+wheezy7_armhf.deb) ...
Selecting previously unselected package libffi5:armhf.
Unpacking libffi5:armhf (from .../libffi5_3.0.10-3+b3_armhf.deb) ...
Selecting previously unselected package libglib2.0-0:armhf.
Unpacking libglib2.0-0:armhf (from .../libglib2.0-0_2.33.12+really2.32.4-5_armhf.deb) ...
Selecting previously unselected package libcroco3:armhf.
Unpacking libcroco3:armhf (from .../libcroco3_0.6.6-2+deb7u1_armhf.deb) ...
Selecting previously unselected package libunistring0:armhf.
Unpacking libunistring0:armhf (from .../libunistring0_0.9.3-5_armhf.deb) ...
Selecting previously unselected package libgettextpo0:armhf.
Unpacking libgettextpo0:armhf (from .../libgettextpo0_0.18.1.1-9_armhf.deb) ...
Selecting previously unselected package libnspr4:armhf.
Unpacking libnspr4:armhf (from .../libnspr4_2%3a4.12-1+deb7u1_armhf.deb) ...
Selecting previously unselected package bsdmainutils.
Unpacking bsdmainutils (from .../bsdmainutils_9.0.3_armhf.deb) ...
Selecting previously unselected package groff-base.
Unpacking groff-base (from .../groff-base_1.21-9_armhf.deb) ...
Selecting previously unselected package man-db.
Unpacking man-db (from .../man-db_2.6.2-1_armhf.deb) ...
Selecting previously unselected package file.
Unpacking file (from .../file_5.11-2+deb7u9_armhf.deb) ...
Selecting previously unselected package gettext-base.
Unpacking gettext-base (from .../gettext-base_0.18.1.1-9_armhf.deb) ...
Selecting previously unselected package cpp-4.7.
Unpacking cpp-4.7 (from .../cpp-4.7_4.7.2-5+rpi1_armhf.deb) ...
Selecting previously unselected package html2text.
Unpacking html2text (from .../html2text_1.3.2a-15_armhf.deb) ...
Selecting previously unselected package gettext.
Unpacking gettext (from .../gettext_0.18.1.1-9_armhf.deb) ...
Selecting previously unselected package intltool-debian.
Unpacking intltool-debian (from .../intltool-debian_0.35.0+20060710.1_all.deb) ...
Selecting previously unselected package po-debconf.
Unpacking po-debconf (from .../po-debconf_1.0.16+nmu2_all.deb) ...
Selecting previously unselected package debhelper.
Unpacking debhelper (from .../debhelper_9.20120909_all.deb) ...
Selecting previously unselected package gcc-4.7.
Unpacking gcc-4.7 (from .../gcc-4.7_4.7.2-5+rpi1_armhf.deb) ...
Selecting previously unselected package libstdc++6-4.7-dev.
Unpacking libstdc++6-4.7-dev (from .../libstdc++6-4.7-dev_4.7.2-5+rpi1_armhf.deb) ...
Selecting previously unselected package g++-4.7.
Unpacking g++-4.7 (from .../g++-4.7_4.7.2-5+rpi1_armhf.deb) ...
Selecting previously unselected package libnspr4-dev.
Unpacking libnspr4-dev (from .../libnspr4-dev_2%3a4.12-1+deb7u1_armhf.deb) ...
Selecting previously unselected package libsqlite3-dev.
Unpacking libsqlite3-dev (from .../libsqlite3-dev_3.7.13-1+deb7u3_armhf.deb) ...
Selecting previously unselected package zlib1g-dev:armhf.
Unpacking zlib1g-dev:armhf (from .../zlib1g-dev_1%3a1.2.7.dfsg-13_armhf.deb) ...
Selecting previously unselected package sbuild-build-depends-nss-dummy.
Unpacking sbuild-build-depends-nss-dummy (from .../sbuild-build-depends-nss-dummy_0.invalid.0_armhf.deb) ...
Setting up libpcre3:armhf (1:8.30-5) ...
Setting up libpipeline1:armhf (1.2.1-1) ...
Setting up libasprintf0c2:armhf (0.18.1.1-9) ...
Setting up libmagic1:armhf (5.11-2+deb7u9) ...
Setting up libsqlite3-0:armhf (3.7.13-1+deb7u3) ...
Setting up libxml2:armhf (2.8.0+dfsg1-7+wheezy7) ...
Setting up libffi5:armhf (3.0.10-3+b3) ...
Setting up libglib2.0-0:armhf (2.33.12+really2.32.4-5) ...
No schema files found: doing nothing.
Setting up libcroco3:armhf (0.6.6-2+deb7u1) ...
Setting up libunistring0:armhf (0.9.3-5) ...
Setting up libgettextpo0:armhf (0.18.1.1-9) ...
Setting up libnspr4:armhf (2:4.12-1+deb7u1) ...
Setting up bsdmainutils (9.0.3) ...
update-alternatives: using /usr/bin/bsd-write to provide /usr/bin/write (write) in auto mode
update-alternatives: using /usr/bin/bsd-from to provide /usr/bin/from (from) in auto mode
Setting up groff-base (1.21-9) ...
Setting up man-db (2.6.2-1) ...
Building database of manual pages ...
Setting up file (5.11-2+deb7u9) ...
Setting up gettext-base (0.18.1.1-9) ...
Setting up cpp-4.7 (4.7.2-5+rpi1) ...
Setting up html2text (1.3.2a-15) ...
Setting up gettext (0.18.1.1-9) ...
Setting up intltool-debian (0.35.0+20060710.1) ...
Setting up po-debconf (1.0.16+nmu2) ...
Setting up debhelper (9.20120909) ...
Setting up gcc-4.7 (4.7.2-5+rpi1) ...
Setting up libnspr4-dev (2:4.12-1+deb7u1) ...
Setting up libsqlite3-dev (3.7.13-1+deb7u3) ...
Setting up zlib1g-dev:armhf (1:1.2.7.dfsg-13) ...
Setting up g++-4.7 (4.7.2-5+rpi1) ...
Setting up sbuild-build-depends-nss-dummy (0.invalid.0) ...
Setting up libstdc++6-4.7-dev (4.7.2-5+rpi1) ...

+------------------------------------------------------------------------------+
| Build environment                                                            |
+------------------------------------------------------------------------------+

Kernel: Linux 4.9.0-0.bpo.1-armmp armhf (armv7l)
Toolchain package versions: binutils_2.22-8+deb7u2 dpkg-dev_1.16.16+rpi1 g++-4.6_4.6.3-14+rpi1 g++-4.7_4.7.2-5+rpi1 gcc-4.6_4.6.3-14+rpi1 gcc-4.7_4.7.2-5+rpi1 libc6-dev_2.13-38+rpi2+deb7u8 libstdc++6_4.7.2-5+rpi1 libstdc++6-4.6-dev_4.6.3-14+rpi1 libstdc++6-4.7-dev_4.7.2-5+rpi1 linux-libc-dev_3.2.51-1+rpi1
Package versions: apt_0.9.7.9+rpi1+deb7u7 base-files_7.1wheezy8+rpi1 base-passwd_3.5.26 bash_4.2+dfsg-0.1+deb7u3 binutils_2.22-8+deb7u2 bsdmainutils_9.0.3 bsdutils_1:2.20.1-5.3 build-essential_11.5+b1 bzip2_1.0.6-4 coreutils_8.13-3.5 cpio_2.11+dfsg-0.1+deb7u1 cpp_4:4.6.3-8 cpp-4.6_4.6.3-14+rpi1 cpp-4.7_4.7.2-5+rpi1 dash_0.5.7-3 debconf_1.5.49 debconf-i18n_1.5.49 debfoster_2.7-1.2 debhelper_9.20120909 debianutils_4.3.2 diffutils_1:3.2-6 dpkg_1.16.16+rpi1 dpkg-dev_1.16.16+rpi1 e2fslibs_1.42.5-1.1+deb7u1 e2fsprogs_1.42.5-1.1+deb7u1 fakeroot_1.18.4-2 file_5.11-2+deb7u9 findutils_4.4.2-4 g++_4:4.6.3-8 g++-4.6_4.6.3-14+rpi1 g++-4.7_4.7.2-5+rpi1 gcc_4:4.6.3-8 gcc-4.5-base_4.5.3-12+rpi1 gcc-4.6_4.6.3-14+rpi1 gcc-4.6-base_4.6.3-14+rpi1 gcc-4.7_4.7.2-5+rpi1 gcc-4.7-base_4.7.2-5+rpi1 gettext_0.18.1.1-9 gettext-base_0.18.1.1-9 gnupg_1.4.12-7+deb7u7 gpgv_1.4.12-7+deb7u7 grep_2.12-2 groff-base_1.21-9 gzip_1.5-1.1 hostname_3.11 html2text_1.3.2a-15 initramfs-tools_0.115~bpo70+1 initscripts_2.88dsf-41+deb7u1 insserv_1.14.0-5 intltool-debian_0.35.0+20060710.1 klibc-utils_2.0.1-3.1+rpi1 kmod_9-3 libacl1_2.2.51-8 libapt-pkg4.12_0.9.7.9+rpi1+deb7u7 libasprintf0c2_0.18.1.1-9 libattr1_1:2.4.46-8 libblkid1_2.20.1-5.3 libbz2-1.0_1.0.6-4 libc-bin_2.13-38+rpi2+deb7u8 libc-dev-bin_2.13-38+rpi2+deb7u8 libc6_2.13-38+rpi2+deb7u8 libc6-dev_2.13-38+rpi2+deb7u8 libclass-isa-perl_0.36-3 libcomerr2_1.42.5-1.1+deb7u1 libcroco3_0.6.6-2+deb7u1 libdb5.1_5.1.29-5 libdbus-1-3_1.6.8-1+deb7u6 libdpkg-perl_1.16.16+rpi1 libffi5_3.0.10-3+b3 libgc1c2_1:7.1-9.1 libgcc1_1:4.7.2-5+rpi1 libgdbm3_1.8.3-11 libgettextpo0_0.18.1.1-9 libglib2.0-0_2.33.12+really2.32.4-5 libgmp10_2:5.0.5+dfsg-2 libgomp1_4.7.2-5+rpi1 libklibc_2.0.1-3.1+rpi1 libkmod2_9-3 liblocale-gettext-perl_1.05-7 liblzma5_5.1.1alpha+20120614-2 libmagic1_5.11-2+deb7u9 libmount1_2.20.1-5.3 libmpc2_0.9-4 libmpfr4_3.1.0-5 libncurses5_5.9-10 libncursesw5_5.9-10 libnih-dbus1_1.0.3-4.1 libnih1_1.0.3-4.1 libnspr4_2:4.12-1+deb7u1 libnspr4-dev_2:4.12-1+deb7u1 libpam-modules_1.1.3-7.1 libpam-modules-bin_1.1.3-7.1 libpam-runtime_1.1.3-7.1 libpam0g_1.1.3-7.1 libpcre3_1:8.30-5 libpipeline1_1.2.1-1 libprocps0_1:3.3.3-3 libreadline6_6.2+dfsg-0.1 libselinux1_2.1.9-5 libsemanage-common_2.1.6-6 libsemanage1_2.1.6-6 libsepol1_2.1.4-3 libslang2_2.2.4-15 libsqlite3-0_3.7.13-1+deb7u3 libsqlite3-dev_3.7.13-1+deb7u3 libss2_1.42.5-1.1+deb7u1 libstdc++6_4.7.2-5+rpi1 libstdc++6-4.6-dev_4.6.3-14+rpi1 libstdc++6-4.7-dev_4.7.2-5+rpi1 libswitch-perl_2.16-2 libtext-charwidth-perl_0.04-7 libtext-iconv-perl_1.7-5 libtext-wrapi18n-perl_0.06-7 libtimedate-perl_1.2000-1 libtinfo5_5.9-10 libudev0_175-7.2 libunistring0_0.9.3-5 libusb-0.1-4_2:0.1.12-20+nmu1 libustr-1.0-1_1.0.4-3 libuuid1_2.20.1-5.3 libxml2_2.8.0+dfsg1-7+wheezy7 linux-libc-dev_3.2.51-1+rpi1 login_1:4.1.5.1-1 lsb-base_4.1+Debian8+rpi1+deb7u1 make_3.81-8.2 makedev_2.3.1-92 man-db_2.6.2-1 mawk_1.3.3-17 mount_2.20.1-5.3 mountall_2.46 multiarch-support_2.13-38+rpi2+deb7u8 ncurses-base_5.9-10 ncurses-bin_5.9-10 passwd_1:4.1.5.1-1 patch_2.6.1-3 perl_5.14.2-21+rpi2+deb7u2 perl-base_5.14.2-21+rpi2+deb7u2 perl-modules_5.14.2-21+rpi2+deb7u2 plymouth_0.8.5.1-5 po-debconf_1.0.16+nmu2 procps_1:3.3.3-3 raspbian-archive-keyring_20120528.2 readline-common_6.2+dfsg-0.1 sbuild-build-depends-core-dummy_0.invalid.0 sbuild-build-depends-nss-dummy_0.invalid.0 sed_4.2.1-10 sensible-utils_0.0.7 sysv-rc_2.88dsf-41+deb7u1 sysvinit_2.88dsf-41+deb7u1 sysvinit-utils_2.88dsf-41+deb7u1 tar_1.26+dfsg-0.1 tzdata_2015f-0+deb7u1 udev_175-7.2 util-linux_2.20.1-5.3 xz-utils_5.1.1alpha+20120614-2 zlib1g_1:1.2.7.dfsg-13 zlib1g-dev_1:1.2.7.dfsg-13

+------------------------------------------------------------------------------+
| Build                                                                        |
+------------------------------------------------------------------------------+


Unpack source
-------------

gpgv: keyblock resource `/sbuild-nonexistent/.gnupg/trustedkeys.gpg': file open error
gpgv: Signature made Fri May 19 12:38:29 2017 UTC using RSA key ID EBC29AB9
gpgv: Can't check signature: public key not found
dpkg-source: warning: failed to verify signature on ./nss_3.26-1+debu7u3.dsc
dpkg-source: info: extracting nss in /<<PKGBUILDDIR>>
dpkg-source: info: unpacking nss_3.26.orig.tar.gz
dpkg-source: info: unpacking nss_3.26-1+debu7u3.debian.tar.gz
dpkg-source: info: applying nss-3.26.2.patch
dpkg-source: info: applying 38_hurd.patch
dpkg-source: info: applying 38_kbsd.patch
dpkg-source: info: applying 80_security_tools.patch
dpkg-source: info: applying 85_security_load.patch
dpkg-source: info: applying replace_expired_paypal_cert.patch
dpkg-source: info: applying customize-gcc.patch
dpkg-source: info: applying CVE-2017-5461.patch
dpkg-source: info: applying CVE-2017-5462.patch

Check disc space
----------------

df: Warning: cannot read table of mounted file systems: No such file or directory
Sufficient free space for build

User Environment
----------------

APT_CONFIG=/var/lib/sbuild/apt.conf
DEB_BUILD_OPTIONS=parallel=4
HOME=/sbuild-nonexistent
LC_ALL=POSIX
LOGNAME=buildd
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games
SCHROOT_ALIAS_NAME=wheezy-staging-armhf-sbuild
SCHROOT_CHROOT_NAME=wheezy-staging-armhf-sbuild
SCHROOT_COMMAND=env
SCHROOT_GID=111
SCHROOT_GROUP=buildd
SCHROOT_SESSION_ID=wheezy-staging-armhf-sbuild-c1a4902b-74b6-4b2b-a24d-1db77c5e16ed
SCHROOT_UID=106
SCHROOT_USER=buildd
SHELL=/bin/sh
TERM=linux
USER=buildd

dpkg-buildpackage
-----------------

dpkg-buildpackage: source package nss
dpkg-buildpackage: source version 2:3.26-1+debu7u3
 dpkg-source --before-build nss-3.26
dpkg-buildpackage: host architecture armhf
 fakeroot debian/rules clean
dh clean
   dh_testdir
   debian/rules override_dh_auto_clean
make[1]: Entering directory `/<<PKGBUILDDIR>>'
/usr/bin/make -C nss \
		clobber \
		SOURCE_PREFIX=/<<PKGBUILDDIR>>/dist \
		SOURCE_MD_DIR=/<<PKGBUILDDIR>>/dist \
		DIST=/<<PKGBUILDDIR>>/dist \
		BUILD_OPT=1 \
		
make[2]: Entering directory `/<<PKGBUILDDIR>>/nss'
coreconf/Werror.mk:90: Unable to find gcc 4.8 or greater, disabling -Werror
rm -rf     Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd coreconf; /usr/bin/make clobber
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf'
rm -rf     Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd nsinstall; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pathsub.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf'
cd lib; /usr/bin/make clobber
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/lib'
rm -rf     Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd util; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/util'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil3.so  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/quickder.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secdig.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdec.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derenc.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dersubr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertime.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errstrs.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64d.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64e.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssrwlk.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssilock.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidstring.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs1sig.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/portreg.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secalgid.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1d.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1e.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1u.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secitem.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secload.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secoid.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sectime.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secport.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/templates.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilmod.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilpars.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/util'
cd freebl; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
Makefile:636: warning: overriding commands for target `Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB'
Makefile:623: warning: ignoring old commands for target `Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl3.so  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/loader.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core   so_locations  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB 
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
cd sqlite; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/sqlite'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsqlite.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsqlite3.so  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sqlite3.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/sqlite'
cd dbm; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm'
rm -rf     Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd include; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm/include'
rm -rf     Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm/include'
cd src; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm/src'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libdbm.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/db.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_bigkey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_func.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_log2.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_page.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash_buf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mktemp.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dirent.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm/src'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm'
cd softoken; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.so  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipsaudt.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstokn.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgglue.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowpbe.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/padbuf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11c.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11u.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdb.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkdb.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkhmac.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpars.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpwd.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/softkver.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tlsprf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jpakesftk.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd legacydb; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.so  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbmshim.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keydb.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgattr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgcreate.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgdestroy.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfind.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfips.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lginit.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowcert.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pcertdb.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11db.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken'
cd base; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/base'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssb.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/arena.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/error.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errorval.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hashops.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libc.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tracker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/item.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/base'
cd dev; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dev'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdev.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devslot.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devtoken.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckhelper.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dev'
cd pki; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pki'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsspki.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asymmkey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certificate.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cryptocontext.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symmkey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/trustdomain.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tdcache.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdecode.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkistore.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkibase.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pki3hack.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pki'
cd libpkix; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd include; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
cd pkix; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd certsel; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixparams.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixresults.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_verifynode.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixstore.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_store.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixtop.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_validate.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_build.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixutil.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_tools.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_error.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_logger.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_list.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_errpaths.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd pkix_pl_nss; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd pki; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixpki.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_string.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_socket.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix'
cd certdb; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/certdb'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcertdb.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/alg1485.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdb.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certv3.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certxutl.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crl.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/genname.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/polcyxtn.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secname.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xauthkid.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xbsconst.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xconst.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/certdb'
cd certhigh; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/certhigh'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcerthi.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhtml.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certreq.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlv2.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocsp.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspsig.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhigh.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfy.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfypkix.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xcrldist.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/certhigh'
cd pk11wrap; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pk11wrap'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dev3hack.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11akey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11auth.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cert.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cxt.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11err.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11kea.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11list.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11load.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mech.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11merge.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11nobj.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11obj.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pars.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pbe.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pk12.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pqg.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11sdr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11skey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11slot.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11util.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pk11wrap'
cd cryptohi; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/cryptohi'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcryptohi.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sechash.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/seckey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secsign.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secvfy.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dsautil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/cryptohi'
cd nss; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/nss'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss3.so  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssinit.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssoptions.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssver.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilwrap.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/nss'
cd ssl; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ssl'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl3.so  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derive.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dtlscon.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/prelib.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3con.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslauth.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcon.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssldef.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslenum.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinit.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ext.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslmutex.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslnonce.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslreveal.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsecur.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsnce.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsock.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltrace.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslver.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/authcert.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmpcert.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinfo.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13con.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcert.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/unix_err.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ssl'
cd pkcs7; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pkcs7'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs7.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certread.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7common.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7create.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7decode.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7encode.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7local.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmime.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pkcs7'
cd pkcs12; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pkcs12'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs12.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12local.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12creat.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12dec.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12plcy.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12tmpl.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12e.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12d.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pkcs12'
cd smime; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/smime'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime3.so  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsarray.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsasn1.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsattr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscinfo.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscipher.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdecode.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencdata.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencode.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsmessage.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmspubkey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsreclist.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssigdata.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsudf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimemessage.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimeutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimever.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/smime'
cd crmf; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/crmf'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcrmf.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfenc.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmftmpl.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfreq.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfpop.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfdec.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfget.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfcont.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfresp.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfrec.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfchal.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/servget.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/respcli.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/respcmn.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/challcli.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asn1cmn.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/crmf'
cd jar; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/jar'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libjar.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarver.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarsign.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jar.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jar-ds.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarfile.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarint.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/jar'
cd ckfw; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckfw.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crypto.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/find.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/instance.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mutex.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/object.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/session.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sessobj.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/slot.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/token.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/wrap.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mechanism.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd builtins; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckbi.so Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/anchor.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/constants.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bfind.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/binst.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bobject.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bsession.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bslot.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoken.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdata.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckbiver.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw'
cd sysinit; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/sysinit'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsssysinit.so  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsssysinit.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/sysinit'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib'
cd cmd; /usr/bin/make clobber
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd'
rm -rf     Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd lib; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/lib'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsectool.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/basicutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secpwd.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derprint.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/moreoids.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pppolicy.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ffs.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11table.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/lib'
cd bltest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/bltest'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bltest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/blapitest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/bltest'
cd fipstest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/fipstest'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/fipstest'
cd lowhashtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/lowhashtest'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowhashtest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowhashtest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/lowhashtest'
cd shlibsign; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/shlibsign Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/shlibsign.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations   /<<PKGBUILDDIR>>/dist/lib/libsoftokn3.chk /<<PKGBUILDDIR>>/dist/lib/libnssdbm3.chk
cd mangle; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign/mangle'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mangle Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mangle.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign/mangle'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign'
cd addbuiltin; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/addbuiltin'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/addbuiltin Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/addbuiltin.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/addbuiltin'
cd atob; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/atob'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/atob Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/atob.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/atob'
cd btoa; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/btoa'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoa Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoa.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/btoa'
cd certcgi; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/certcgi'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certcgi Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certcgi.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/certcgi'
cd certutil; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/certutil'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certutil Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certext.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keystuff.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/certutil'
cd chktest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/chktest'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/chktest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/chktest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/chktest'
cd crlutil; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/crlutil'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlutil Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlgen.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/crlutil'
cd crmftest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/crmftest'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmftest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/testcrmf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/crmftest'
cd dbtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/dbtest'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbtest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbtest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/dbtest'
cd derdump; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/derdump'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdump Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdump.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/derdump'
cd digest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/digest'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/digest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/digest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/digest'
cd ecperf; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ecperf'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ecperf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ecperf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ecperf'
cd ectest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ectest'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ectest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ectest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ectest'
cd httpserv; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/httpserv'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/httpserv Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/httpserv.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/httpserv'
cd listsuites; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/listsuites'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/listsuites Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/listsuites.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/listsuites'
cd makepqg; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/makepqg'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/makepqg Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/makepqg.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/makepqg'
cd multinit; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/multinit'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/multinit Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/multinit.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/multinit'
cd ocspclnt; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ocspclnt'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspclnt Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspclnt.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ocspclnt'
cd ocspresp; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ocspresp'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspresp Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspresp.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ocspresp'
cd oidcalc; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/oidcalc'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidcalc Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidcalc.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/oidcalc'
cd p7content; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7content'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7content Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7content.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7content'
cd p7env; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7env'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7env Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7env.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7env'
cd p7sign; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7sign'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7sign Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7sign.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7sign'
cd p7verify; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7verify'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7verify Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7verify.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7verify'
cd pk12util; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk12util'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk12util Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk12util.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk12util'
cd pk11gcmtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk11gcmtest'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11gcmtest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11gcmtest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk11gcmtest'
cd pk11mode; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk11mode'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mode Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mode.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk11mode'
cd pk1sign; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk1sign'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk1sign Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk1sign.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk1sign'
cd pp; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pp'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pp Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pp.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pp'
cd pwdecrypt; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pwdecrypt'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pwdecrypt Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pwdecrypt.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pwdecrypt'
cd rsaperf; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/rsaperf'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/rsaperf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/rsaperf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/defkey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/rsaperf'
cd sdrtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/sdrtest'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdrtest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdrtest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/sdrtest'
cd selfserv; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/selfserv'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/selfserv Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/selfserv.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/selfserv'
cd signtool; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/signtool'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signtool Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signtool.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certgen.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/javascript.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sign.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/verify.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/zip.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/signtool'
cd signver; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/signver'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signver Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signver.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk7print.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/signver'
cd smimetools; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/smimetools'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/smimetools'
cd ssltap; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ssltap'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltap Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltap.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ssltap'
cd strsclnt; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/strsclnt'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/strsclnt Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/strsclnt.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/strsclnt'
cd symkeyutil; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/symkeyutil'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symkeyutil Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symkeyutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/symkeyutil'
cd tests; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/tests'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/baddbdir Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/conflict Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertimetest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encodeinttest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nonspr10 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/remtest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmodtest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/baddbdir.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/conflict.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertimetest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encodeinttest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nonspr10.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/remtest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmodtest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/tests'
cd tstclnt; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/tstclnt'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tstclnt Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tstclnt.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/tstclnt'
cd vfychain; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/vfychain'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfychain Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfychain.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/vfychain'
cd vfyserv; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/vfyserv'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyserv Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyserv.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/vfyserv'
cd modutil; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/modutil'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/modutil Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/modutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/instsec.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/install.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/installparse.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/install-ds.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/modutil'
cd pkix-errcodes; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pkix-errcodes'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix-errcodes Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix-errcodes.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pkix-errcodes'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd'
cd external_tests; /usr/bin/make clobber
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests'
rm -rf     Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
cd google_test; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/google_test'
rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest1.so  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/google_test'
cd common; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/common'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/common'
cd der_gtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/der_gtest'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/der_gtest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/der_getint_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/der_gtest'
cd util_gtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/util_gtest'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_gtest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_utf8_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_b64_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/util_gtest'
cd pk11_gtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/pk11_gtest'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_gtest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_aeskeywrap_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_chacha20poly1305_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_pbkdf2_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_prf_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_rsapss_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/pk11_gtest'
cd ssl_gtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/ssl_gtest'
rm -rf   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_gtest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl_internals.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_agent_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_auth_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_ciphersuite_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_dhe_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_drop_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_ems_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_extension_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_gtest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_loopback_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_resumption_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_skip_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_staticrsa_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_v2_client_hello_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_version_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/test_io.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_agent.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_connect.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_hkdf_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_filter.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_parser.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core  so_locations  
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/ssl_gtest'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests'
make[2]: Leaving directory `/<<PKGBUILDDIR>>/nss'
rm -rf /<<PKGBUILDDIR>>/dist debian/libnss3-1d.links debian/libnss3-dev.links debian/libnss3.lintian-overrides debian/nss-config debian/nss.pc
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
   dh_clean
 debian/rules build-arch
dh build-arch
   dh_testdir -a
   dh_auto_configure -a
   debian/rules override_dh_auto_build
make[1]: Entering directory `/<<PKGBUILDDIR>>'
/usr/bin/make -C nss \
		all \
		MOZILLA_CLIENT=1 \
		NSPR_INCLUDE_DIR=/usr/include/nspr \
		NSPR_LIB_DIR=/usr/lib \
		SOURCE_PREFIX=/<<PKGBUILDDIR>>/dist \
		SOURCE_MD_DIR=/<<PKGBUILDDIR>>/dist \
		DIST=/<<PKGBUILDDIR>>/dist \
		BUILD_OPT=1 \
		OPTIMIZER="-g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2" \
		LDFLAGS='-Wl,-z,relro $(ARCHFLAG) $(ZDEFS_FLAG)' \
		DSO_LDOPTS='-shared $(LDFLAGS)' \
		NSS_USE_SYSTEM_SQLITE=1 \
		NSS_ENABLE_ECC=1 \
		CHECKLOC= \
		
make[2]: Entering directory `/<<PKGBUILDDIR>>/nss'
coreconf/Werror.mk:90: Unable to find gcc 4.8 or greater, disabling -Werror
cd coreconf; /usr/bin/make export
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf'
cd nsinstall; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
cd nsinstall; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/coreconf -I/<<PKGBUILDDIR>>/dist/private/coreconf  nsinstall.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pathsub.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/coreconf -I/<<PKGBUILDDIR>>/dist/private/coreconf  pathsub.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/coreconf -I/<<PKGBUILDDIR>>/dist/private/coreconf  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pathsub.o -Wl,-z,relro  -Wl,-z,defs   -lpthread  -ldl -lc
true -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf'
cd lib; /usr/bin/make export
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/lib'
cd util; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/util'
Creating /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 base64.h ciferfam.h hasht.h nssb64.h nssb64t.h nsslocks.h nssilock.h nssilckt.h nssrwlk.h nssrwlkt.h nssutil.h pkcs11.h pkcs11f.h pkcs11p.h pkcs11t.h pkcs11n.h pkcs11u.h pkcs1sig.h portreg.h secasn1.h secasn1t.h seccomon.h secder.h secdert.h secdig.h secdigt.h secitem.h secoid.h secoidt.h secport.h secerr.h utilmodt.h utilrename.h utilpars.h utilparst.h /<<PKGBUILDDIR>>/dist/public/nss
Creating /<<PKGBUILDDIR>>/dist/private/nss
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 verref.h templates.c /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/util'
cd freebl; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
Makefile:636: warning: overriding commands for target `Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB'
Makefile:623: warning: ignoring old commands for target `Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 blapit.h shsign.h ecl/ecl-exp.h nsslowhash.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 alghmac.h blapi.h chacha20poly1305.h hmacct.h secmpi.h secrng.h ec.h ecl/ecl.h ecl/ecl-curve.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
cd dbm; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm'
cd include; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm/include'
Creating /<<PKGBUILDDIR>>/dist/public/dbm
../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 mcom_db.h ncompat.h winfile.h /<<PKGBUILDDIR>>/dist/public/dbm
Creating /<<PKGBUILDDIR>>/dist/private/dbm
../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hsearch.h page.h extern.h queue.h hash.h search.h /<<PKGBUILDDIR>>/dist/private/dbm
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm/include'
cd src; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm/src'
make[5]: Nothing to be done for `export'.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm/src'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm'
cd softoken; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken'
cd legacydb; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 lowkeyi.h lowkeyti.h /<<PKGBUILDDIR>>/dist/public/nss
cd legacydb; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 lgglue.h pkcs11ni.h softoken.h softoknt.h softkver.h sdb.h sftkdbt.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken'
cd base; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/base'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 baset.h base.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/base'
cd dev; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dev'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dev'
cd pki; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pki'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pki'
cd libpkix; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix'
cd include; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h /<<PKGBUILDDIR>>/dist/private/nss
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
cd pkix; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd certsel; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
cd certsel; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd pkix_pl_nss; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
cd pki; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
cd pki; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
cd include; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h /<<PKGBUILDDIR>>/dist/private/nss
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
cd pkix; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd certsel; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd pkix_pl_nss; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
cd pki; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
There are no private exports.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix'
cd certdb; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/certdb'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/certdb'
cd certhigh; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/certhigh'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/certhigh'
cd pk11wrap; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pk11wrap'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmod.h secmodt.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pk11wrap'
cd cryptohi; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/cryptohi'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h sechash.h /<<PKGBUILDDIR>>/dist/public/nss
There are no private exports.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/cryptohi'
cd nss; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/nss'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nss.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrenam.h nssoptions.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/nss'
cd ssl; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ssl'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h /<<PKGBUILDDIR>>/dist/public/nss
There are no private exports.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ssl'
cd pkcs7; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pkcs7'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h /<<PKGBUILDDIR>>/dist/public/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pkcs7'
cd pkcs12; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pkcs12'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h /<<PKGBUILDDIR>>/dist/public/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pkcs12'
cd smime; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/smime'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h /<<PKGBUILDDIR>>/dist/public/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/smime'
cd crmf; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/crmf'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/crmf'
cd jar; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/jar'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h /<<PKGBUILDDIR>>/dist/public/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/jar'
cd ckfw; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw'
cd builtins; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckbi.h /<<PKGBUILDDIR>>/dist/public/nss
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h /<<PKGBUILDDIR>>/dist/public/nss
cd builtins; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib'
cd cmd; /usr/bin/make export
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd'
cd lib; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/lib'
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 basicutil.h secutil.h pk11table.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/lib'
cd bltest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/bltest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/bltest'
cd fipstest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/fipstest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/fipstest'
cd lowhashtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/lowhashtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/lowhashtest'
cd shlibsign; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign'
cd mangle; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign/mangle'
make[5]: Nothing to be done for `export'.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign/mangle'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign'
cd addbuiltin; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/addbuiltin'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/addbuiltin'
cd atob; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/atob'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/atob'
cd btoa; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/btoa'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/btoa'
cd certcgi; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/certcgi'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/certcgi'
cd certutil; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/certutil'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/certutil'
cd chktest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/chktest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/chktest'
cd crlutil; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/crlutil'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/crlutil'
cd crmftest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/crmftest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/crmftest'
cd dbtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/dbtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/dbtest'
cd derdump; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/derdump'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/derdump'
cd digest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/digest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/digest'
cd ecperf; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ecperf'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ecperf'
cd ectest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ectest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ectest'
cd httpserv; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/httpserv'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/httpserv'
cd listsuites; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/listsuites'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/listsuites'
cd makepqg; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/makepqg'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/makepqg'
cd multinit; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/multinit'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/multinit'
cd ocspclnt; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ocspclnt'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ocspclnt'
cd ocspresp; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ocspresp'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ocspresp'
cd oidcalc; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/oidcalc'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/oidcalc'
cd p7content; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7content'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7content'
cd p7env; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7env'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7env'
cd p7sign; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7sign'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7sign'
cd p7verify; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7verify'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7verify'
cd pk12util; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk12util'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk12util'
cd pk11gcmtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk11gcmtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk11gcmtest'
cd pk11mode; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk11mode'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk11mode'
cd pk1sign; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk1sign'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk1sign'
cd pp; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pp'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pp'
cd pwdecrypt; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pwdecrypt'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pwdecrypt'
cd rsaperf; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/rsaperf'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/rsaperf'
cd sdrtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/sdrtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/sdrtest'
cd selfserv; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/selfserv'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/selfserv'
cd signtool; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/signtool'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/signtool'
cd signver; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/signver'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/signver'
cd smimetools; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/smimetools'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/smimetools'
cd ssltap; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ssltap'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ssltap'
cd strsclnt; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/strsclnt'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/strsclnt'
cd symkeyutil; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/symkeyutil'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/symkeyutil'
cd tests; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/tests'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/tests'
cd tstclnt; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/tstclnt'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/tstclnt'
cd vfychain; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/vfychain'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/vfychain'
cd vfyserv; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/vfyserv'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/vfyserv'
cd modutil; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/modutil'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/modutil'
cd pkix-errcodes; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pkix-errcodes'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pkix-errcodes'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd'
cd external_tests; /usr/bin/make export
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests'
cd google_test; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/google_test'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/google_test'
cd common; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/common'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/common'
cd der_gtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/der_gtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/der_gtest'
cd util_gtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/util_gtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/util_gtest'
cd pk11_gtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/pk11_gtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/pk11_gtest'
cd ssl_gtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/ssl_gtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/ssl_gtest'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests'
cd coreconf; /usr/bin/make libs
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf'
cd nsinstall; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
true -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf'
cd lib; /usr/bin/make libs
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/lib'
cd util; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/util'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/quickder.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  quickder.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secdig.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secdig.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  derdec.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derenc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  derenc.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dersubr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  dersubr.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertime.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  dertime.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errstrs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  errstrs.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64d.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  nssb64d.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64e.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  nssb64e.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssrwlk.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  nssrwlk.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssilock.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  nssilock.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidstring.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  oidstring.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs1sig.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkcs1sig.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/portreg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  portreg.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secalgid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secalgid.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1d.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secasn1d.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1e.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secasn1e.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1u.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secasn1u.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secitem.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secitem.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secload.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secload.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secoid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secoid.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sectime.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sectime.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secport.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secport.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/templates.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  templates.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  utf8.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilmod.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  utilmod.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilpars.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  utilpars.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/quickder.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secdig.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdec.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derenc.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dersubr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertime.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errstrs.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64d.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64e.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssrwlk.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssilock.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidstring.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs1sig.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/portreg.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secalgid.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1d.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1e.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1u.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secitem.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secload.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secoid.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sectime.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secport.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/templates.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilmod.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilpars.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil.a
grep -v ';-' nssutil.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssutil.def
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil3.so
gcc-4.7 -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libnssutil3.so  -Wl,--version-script,Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssutil.def -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil3.so Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/quickder.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secdig.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdec.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derenc.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dersubr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertime.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errstrs.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64d.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64e.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssrwlk.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssilock.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidstring.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs1sig.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/portreg.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secalgid.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1d.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1e.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1u.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secitem.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secload.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secoid.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sectime.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secport.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/templates.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilmod.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilpars.o    -L/<<PKGBUILDDIR>>/dist/lib -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil3.so
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil.a /<<PKGBUILDDIR>>/dist/lib
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil3.so /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/util'
cd freebl; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
Makefile:636: warning: overriding commands for target `Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB'
Makefile:623: warning: ignoring old commands for target `Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/loader.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  loader.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/loader.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl.a
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl.a /<<PKGBUILDDIR>>/dist/lib
mkdir Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB
/usr/bin/make FREEBL_CHILD_BUILD=1 \
 OBJDIR=Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  freeblver.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ldvector.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  sysrand.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  sha_fast.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  md2.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  md5.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  sha512.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  alghmac.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  rawhash.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  alg2268.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  arcfour.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  arcfive.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  -fno-strict-aliasing desblapi.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/des.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  des.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  drbg.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/chacha20poly1305.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  chacha20poly1305.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/cts.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  cts.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ctr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ctr.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/fipsfreebl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  fipsfreebl.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/gcm.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  gcm.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/hmacct.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  hmacct.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  rijndael.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  aeskeywrap.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  camellia.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  dh.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ec.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecdecode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecdecode.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  pqg.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  dsa.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  rsa.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsapkcs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  rsapkcs.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  shvfy.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  tlsprfalg.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  seed.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  jpake.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  mpi/mpprime.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  mpi/mpmontg.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  mpi/mplogic.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  mpi/mpi.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  mpi/mp_gf2m.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_arm.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  mpi/mpi_arm.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  mpi/mpcpucache.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecl.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecl_curve.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecl_mult.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecl_gf.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecp_aff.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecp_jac.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecp_mont.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec_naf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ec_naf.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecp_jm.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecp_256.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_384.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecp_384.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_521.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecp_521.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256_32.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  ecl/ecp_256_32.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  stubs.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  nsslowhash.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/poly1305.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  poly1305.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/chacha20.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  chacha20.c
grep -v ';-' freebl_hash_vector.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblpriv.def
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so
gcc-4.7 -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libfreeblpriv3.so  -Wl,--version-script,Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblpriv.def -Wl,-Bsymbolic -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/des.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/chacha20poly1305.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/cts.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ctr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/fipsfreebl.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/gcm.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/hmacct.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecdecode.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsapkcs.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_arm.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec_naf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_384.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_521.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256_32.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/poly1305.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/chacha20.o      -ldl -lc
chmod +x Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so /<<PKGBUILDDIR>>/dist/lib
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
/usr/bin/make FREEBL_CHILD_BUILD=1 USE_STUB_BUILD=1 \
 OBJDIR=Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/lowhash_vector.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE  -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG  -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl  lowhash_vector.c
grep -v ';-' freebl_hash.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so
gcc-4.7 -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libfreebl3.so  -Wl,--version-script,Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def -Wl,-Bsymbolic -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/lowhash_vector.o      -ldl -lc
chmod +x Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so /<<PKGBUILDDIR>>/dist/lib
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
cd dbm; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm'
cd include; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm/include'
make[5]: Nothing to be done for `libs'.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm/include'
cd src; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm/src'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/db.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm  db.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_bigkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm  h_bigkey.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_func.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm  h_func.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_log2.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm  h_log2.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_page.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm  h_page.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm  hash.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash_buf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm  hash_buf.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mktemp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm  mktemp.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dirent.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm  dirent.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libdbm.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libdbm.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/db.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_bigkey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_func.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_log2.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_page.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash_buf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mktemp.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dirent.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libdbm.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libdbm.a
../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libdbm.a /<<PKGBUILDDIR>>/dist/lib
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm/src'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm'
cd softoken; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipsaudt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  fipsaudt.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  fipstest.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstokn.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  fipstokn.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgglue.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  lgglue.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  lowkey.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowpbe.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  lowpbe.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/padbuf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  padbuf.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkcs11.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11c.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkcs11c.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11u.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkcs11u.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sdb.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sftkdb.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkhmac.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sftkhmac.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpars.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sftkpars.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpwd.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sftkpwd.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/softkver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  softkver.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tlsprf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  tlsprf.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jpakesftk.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  jpakesftk.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipsaudt.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstokn.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgglue.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowpbe.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/padbuf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11c.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11u.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdb.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkdb.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkhmac.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpars.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpwd.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/softkver.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tlsprf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jpakesftk.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn.a
grep -v ';-' softokn.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/softokn.def
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.so
gcc-4.7 -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libsoftokn3.so  -Wl,--version-script,Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/softokn.def -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.so Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipsaudt.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstokn.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgglue.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowpbe.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/padbuf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11c.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11u.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdb.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkdb.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkhmac.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpars.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpwd.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/softkver.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tlsprf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jpakesftk.o   /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.so
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.so /<<PKGBUILDDIR>>/dist/lib
cd legacydb; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbmshim.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  dbmshim.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keydb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  keydb.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgattr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  lgattr.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgcreate.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  lgcreate.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgdestroy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  lgdestroy.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfind.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  lgfind.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfips.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  lgfips.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lginit.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  lginit.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  lgutil.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowcert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  lowcert.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  lowkey.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pcertdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  pcertdb.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11db.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  pk11db.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbmshim.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keydb.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgattr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgcreate.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgdestroy.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfind.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfips.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lginit.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowcert.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pcertdb.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11db.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm.a
grep -v ';-' nssdbm.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssdbm.def
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.so
gcc-4.7 -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libnssdbm3.so  -Wl,--version-script,Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssdbm.def -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.so Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbmshim.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keydb.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgattr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgcreate.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgdestroy.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfind.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfips.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lginit.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowcert.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pcertdb.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11db.o   /<<PKGBUILDDIR>>/dist/lib/libfreebl.a /<<PKGBUILDDIR>>/dist/lib/libdbm.a  -L/<<PKGBUILDDIR>>/dist/lib -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.so
../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm.a /<<PKGBUILDDIR>>/dist/lib
../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.so /<<PKGBUILDDIR>>/dist/lib
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken'
cd base; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/base'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/arena.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  arena.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/error.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  error.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errorval.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  errorval.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hashops.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  hashops.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  libc.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tracker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  tracker.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/item.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  item.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  utf8.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  list.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  hash.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssb.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssb.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/arena.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/error.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errorval.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hashops.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libc.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tracker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/item.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssb.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssb.a
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssb.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/base'
cd dev; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dev'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devslot.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  devslot.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devtoken.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  devtoken.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  devutil.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckhelper.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  ckhelper.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdev.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdev.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devslot.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devtoken.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckhelper.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdev.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdev.a
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdev.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dev'
cd pki; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pki'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asymmkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  asymmkey.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certificate.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  certificate.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cryptocontext.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  cryptocontext.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symmkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  symmkey.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/trustdomain.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  trustdomain.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tdcache.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  tdcache.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdecode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  certdecode.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkistore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  pkistore.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkibase.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  pkibase.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pki3hack.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  pki3hack.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsspki.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsspki.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asymmkey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certificate.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cryptocontext.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symmkey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/trustdomain.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tdcache.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdecode.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkistore.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkibase.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pki3hack.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsspki.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsspki.a
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsspki.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pki'
cd libpkix; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix'
cd include; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
make[5]: Nothing to be done for `libs'.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
cd pkix; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd certsel; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certselector.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_certselector.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_comcertselparams.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcertsel.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcertsel.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcertsel.a
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlselector.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_crlselector.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_comcrlselparams.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcrlsel.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcrlsel.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcrlsel.a
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_basicconstraintschecker.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_certchainchecker.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_crlchecker.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_ekuchecker.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_expirationchecker.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_namechainingchecker.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_nameconstraintschecker.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_ocspchecker.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_revocationmethod.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_revocationchecker.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policychecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_policychecker.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_signaturechecker.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_targetcertchecker.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixchecker.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixchecker.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixchecker.a
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_trustanchor.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_trustanchor.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_procparams.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_procparams.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valparams.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_valparams.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_resourcelimits.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixparams.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixparams.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixparams.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixparams.a
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_buildresult.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_buildresult.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policynode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_policynode.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valresult.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_valresult.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_verifynode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_verifynode.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixresults.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixresults.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_verifynode.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixresults.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixresults.a
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_store.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_store.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixstore.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixstore.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_store.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixstore.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixstore.a
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_validate.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_validate.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_lifecycle.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_lifecycle.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_build.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_build.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixtop.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixtop.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_validate.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_build.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixtop.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixtop.a
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_tools.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_tools.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_error.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_error.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_logger.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_logger.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_list.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_list.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_errpaths.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_errpaths.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixutil.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixutil.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_tools.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_error.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_logger.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_list.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_errpaths.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixutil.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixutil.a
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd pkix_pl_nss; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
cd pki; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_basicconstraints.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_cert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_cert.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_certpolicyinfo.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_certpolicymap.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_certpolicyqualifier.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_crl.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_crldp.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_crlentry.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_date.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_date.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_generalname.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_infoaccess.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_nameconstraints.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_ocsprequest.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_ocspresponse.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_publickey.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_x500name.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_ocspcertid.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixpki.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixpki.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixpki.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixpki.a
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_bigint.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_bytearray.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_common.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_common.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_error.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_error.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_hashtable.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_lifecycle.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mem.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_mem.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_monitorlock.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_mutex.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_object.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_object.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_oid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_oid.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_primhash.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_rwlock.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_string.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_string.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixsystem.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_string.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixsystem.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixsystem.a
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_aiamgr.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_colcertstore.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_httpcertstore.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_httpdefaultclient.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_ldaptemplates.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_ldapcertstore.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_ldapresponse.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_ldaprequest.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_ldapdefaultclient.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_nsscontext.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_pk11certstore.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pkix_pl_socket.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixmodule.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_socket.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixmodule.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixmodule.a
../../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix'
cd certdb; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/certdb'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/alg1485.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  alg1485.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  certdb.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certv3.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  certv3.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certxutl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  certxutl.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  crl.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/genname.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  genname.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/stanpcertdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  stanpcertdb.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/polcyxtn.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  polcyxtn.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secname.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secname.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xauthkid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  xauthkid.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xbsconst.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  xbsconst.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xconst.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  xconst.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcertdb.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcertdb.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/alg1485.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdb.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certv3.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certxutl.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crl.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/genname.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/polcyxtn.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secname.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xauthkid.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xbsconst.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xconst.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcertdb.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcertdb.a
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcertdb.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/certdb'
cd certhigh; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/certhigh'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhtml.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  certhtml.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certreq.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  certreq.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlv2.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  crlv2.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocsp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ocsp.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspsig.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ocspsig.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhigh.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  certhigh.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  certvfy.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfypkix.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  certvfypkix.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xcrldist.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  xcrldist.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcerthi.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcerthi.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhtml.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certreq.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlv2.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocsp.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspsig.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhigh.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfy.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfypkix.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xcrldist.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcerthi.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcerthi.a
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcerthi.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/certhigh'
cd pk11wrap; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pk11wrap'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dev3hack.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  dev3hack.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11akey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11akey.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11auth.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11auth.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11cert.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cxt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11cxt.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11err.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11err.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11kea.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11kea.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11list.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11list.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11load.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11load.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mech.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11mech.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11merge.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11merge.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11nobj.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11nobj.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11obj.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11obj.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pars.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11pars.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pbe.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11pbe.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pk12.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11pk12.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pqg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11pqg.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11sdr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11sdr.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11skey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11skey.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11slot.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11slot.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11util.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11util.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpk11wrap.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dev3hack.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11akey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11auth.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cert.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cxt.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11err.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11kea.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11list.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11load.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mech.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11merge.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11nobj.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11obj.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pars.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pbe.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pk12.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pqg.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11sdr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11skey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11slot.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11util.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpk11wrap.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpk11wrap.a
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pk11wrap'
cd cryptohi; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/cryptohi'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sechash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sechash.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/seckey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  seckey.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secsign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secsign.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secvfy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secvfy.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dsautil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  dsautil.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcryptohi.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcryptohi.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sechash.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/seckey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secsign.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secvfy.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dsautil.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcryptohi.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcryptohi.a
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/cryptohi'
cd nss; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/nss'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssinit.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  nssinit.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssoptions.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  nssoptions.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  nssver.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilwrap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  utilwrap.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssinit.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssoptions.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssver.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilwrap.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss.a
grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nss.def
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss3.so
gcc-4.7 -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libnss3.so  -Wl,--version-script,Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nss.def -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss3.so Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssinit.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssoptions.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssver.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilwrap.o ../certhigh/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhtml.o ../certhigh/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certreq.o ../certhigh/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlv2.o ../certhigh/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocsp.o ../certhigh/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspsig.o ../certhigh/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhigh.o ../certhigh/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfy.o ../certhigh/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfypkix.o ../certhigh/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xcrldist.o ../cryptohi/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sechash.o ../cryptohi/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/seckey.o ../cryptohi/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secsign.o ../cryptohi/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secvfy.o ../cryptohi/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dsautil.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dev3hack.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11akey.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11auth.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cert.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11err.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11kea.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11list.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11load.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mech.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11merge.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11obj.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pars.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11skey.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11slot.o ../pk11wrap/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11util.o ../certdb/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/alg1485.o ../certdb/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdb.o ../certdb/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certv3.o ../certdb/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certxutl.o ../certdb/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crl.o ../certdb/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/genname.o ../certdb/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/stanpcertdb.o ../certdb/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/polcyxtn.o ../certdb/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secname.o ../certdb/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xauthkid.o ../certdb/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xbsconst.o ../certdb/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xconst.o ../pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asymmkey.o ../pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certificate.o ../pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cryptocontext.o ../pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symmkey.o ../pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/trustdomain.o ../pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tdcache.o ../pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdecode.o ../pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkistore.o ../pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkibase.o ../pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pki3hack.o ../dev/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devslot.o ../dev/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devtoken.o ../dev/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devutil.o ../dev/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckhelper.o ../base/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/arena.o ../base/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/error.o ../base/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errorval.o ../base/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hashops.o ../base/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libc.o ../base/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tracker.o ../base/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/item.o ../base/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o ../base/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o ../base/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_socket.o   -L/<<PKGBUILDDIR>>/dist/lib -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss3.so
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss.a /<<PKGBUILDDIR>>/dist/lib
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss3.so /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/nss'
cd ssl; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ssl'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derive.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  derive.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dtlscon.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  dtlscon.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/prelib.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  prelib.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3con.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ssl3con.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3gthr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ssl3gthr.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslauth.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslauth.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcon.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslcon.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssldef.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ssldef.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslenum.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslenum.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslerr.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerrstrs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslerrstrs.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinit.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslinit.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ext.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ssl3ext.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslmutex.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslmutex.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslnonce.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslnonce.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslreveal.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslreveal.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsecur.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslsecur.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsnce.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslsnce.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsock.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslsock.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltrace.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ssltrace.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslver.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/authcert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  authcert.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmpcert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmpcert.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslinfo.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ecc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ssl3ecc.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13con.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  tls13con.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13hkdf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  tls13hkdf.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  sslcert.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/unix_err.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  unix_err.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derive.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dtlscon.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/prelib.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3con.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslauth.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcon.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssldef.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslenum.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinit.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ext.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslmutex.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslnonce.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslreveal.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsecur.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsnce.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsock.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltrace.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslver.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/authcert.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmpcert.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinfo.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13con.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcert.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/unix_err.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl.a
grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl.def
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl3.so
gcc-4.7 -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libssl3.so  -Wl,--version-script,Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl.def -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl3.so Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derive.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dtlscon.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/prelib.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3con.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslauth.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcon.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssldef.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslenum.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinit.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ext.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslmutex.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslnonce.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslreveal.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsecur.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsnce.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsock.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltrace.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslver.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/authcert.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmpcert.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinfo.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13con.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcert.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/unix_err.o   /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  -L/<<PKGBUILDDIR>>/dist/lib -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc -lz
chmod +x Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl3.so
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl.a /<<PKGBUILDDIR>>/dist/lib
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl3.so /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ssl'
cd pkcs7; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pkcs7'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certread.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  certread.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7common.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p7common.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7create.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p7create.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7decode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p7decode.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7encode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p7encode.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7local.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p7local.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmime.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secmime.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs7.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs7.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certread.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7common.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7create.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7decode.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7encode.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7local.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmime.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs7.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs7.a
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pkcs7'
cd pkcs12; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pkcs12'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12local.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p12local.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12creat.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p12creat.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12dec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p12dec.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12plcy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p12plcy.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12tmpl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p12tmpl.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12e.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p12e.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12d.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  p12d.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs12.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs12.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12local.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12creat.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12dec.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12plcy.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12tmpl.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12e.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12d.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs12.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs12.a
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pkcs12'
cd smime; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/smime'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsarray.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsarray.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsasn1.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsasn1.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsattr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsattr.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscinfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmscinfo.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscipher.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmscipher.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdecode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsdecode.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsdigdata.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsdigest.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsencdata.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsencode.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsenvdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsenvdata.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsmessage.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsmessage.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmspubkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmspubkey.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsrecinfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsrecinfo.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsreclist.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsreclist.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssigdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmssigdata.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssiginfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmssiginfo.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsudf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsudf.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmsutil.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimemessage.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  smimemessage.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimeutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  smimeutil.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimever.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  smimever.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsarray.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsasn1.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsattr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscinfo.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscipher.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdecode.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencdata.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencode.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsmessage.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmspubkey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsreclist.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssigdata.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsudf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimemessage.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimeutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimever.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime.a
grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smime.def
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime3.so
gcc-4.7 -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libsmime3.so  -Wl,--version-script,Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smime.def -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime3.so Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsarray.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsasn1.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsattr.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscinfo.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscipher.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdecode.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencdata.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencode.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsmessage.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmspubkey.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsreclist.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssigdata.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsudf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimemessage.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimeutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimever.o ../pkcs12/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12local.o ../pkcs12/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12creat.o ../pkcs12/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12dec.o ../pkcs12/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12plcy.o ../pkcs12/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12tmpl.o ../pkcs12/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12e.o ../pkcs12/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12d.o ../pkcs7/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certread.o ../pkcs7/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7common.o ../pkcs7/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7create.o ../pkcs7/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7decode.o ../pkcs7/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7encode.o ../pkcs7/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7local.o ../pkcs7/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmime.o   -L/<<PKGBUILDDIR>>/dist/lib -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime3.so
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime.a /<<PKGBUILDDIR>>/dist/lib
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime3.so /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/smime'
cd crmf; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/crmf'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfenc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  crmfenc.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmftmpl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  crmftmpl.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfreq.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  crmfreq.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfpop.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  crmfpop.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfdec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  crmfdec.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfget.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  crmfget.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfcont.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  crmfcont.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfasn1.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmmfasn1.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfresp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmmfresp.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfrec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmmfrec.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfchal.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  cmmfchal.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/servget.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  servget.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  encutil.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/respcli.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  respcli.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/respcmn.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  respcmn.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/challcli.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  challcli.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asn1cmn.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  asn1cmn.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcrmf.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcrmf.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfenc.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmftmpl.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfreq.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfpop.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfdec.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfget.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfcont.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfresp.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfrec.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfchal.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/servget.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/respcli.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/respcmn.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/challcli.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asn1cmn.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcrmf.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcrmf.a
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcrmf.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/crmf'
cd jar; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/jar'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  jarver.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarsign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  jarsign.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jar.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  jar.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jar-ds.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  jar-ds.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarfile.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  jarfile.c
jarfile.c: In function 'jar_listzip':
jarfile.c:805:19: warning: 'it' may be used uninitialized in this function [-Wmaybe-uninitialized]
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarint.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  jarint.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libjar.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libjar.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarver.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarsign.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jar.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jar-ds.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarfile.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarint.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libjar.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libjar.a
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libjar.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/jar'
cd ckfw; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crypto.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  crypto.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/find.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  find.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  hash.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/instance.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  instance.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mutex.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  mutex.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/object.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  object.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/session.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  session.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sessobj.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  sessobj.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/slot.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  slot.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/token.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  token.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/wrap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  wrap.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mechanism.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr  mechanism.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckfw.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckfw.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crypto.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/find.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/instance.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mutex.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/object.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/session.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sessobj.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/slot.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/token.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/wrap.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mechanism.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckfw.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckfw.a
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckfw.a /<<PKGBUILDDIR>>/dist/lib
cd builtins; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/anchor.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  anchor.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/constants.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  constants.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bfind.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  bfind.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/binst.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  binst.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bobject.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  bobject.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bsession.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  bsession.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bslot.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  bslot.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoken.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  btoken.c
perl certdata.perl < certdata.txt > Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdata.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdata.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckbiver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I.  ckbiver.c
grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssckbi.def
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckbi.so
gcc-4.7 -shared -Wl,-z,relro  -Wl,-z,defs -Wl,-soname -Wl,libnssckbi.so  -Wl,--version-script,Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssckbi.def -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckbi.so Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/anchor.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/constants.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bfind.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/binst.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bobject.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bsession.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bslot.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoken.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdata.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckbiver.o   /<<PKGBUILDDIR>>/dist/lib/libnssckfw.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a  -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckbi.so
../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckbi.so /<<PKGBUILDDIR>>/dist/lib
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib'
cd cmd; /usr/bin/make libs
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd'
cd lib; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/lib'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/basicutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  basicutil.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secutil.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secpwd.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  secpwd.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derprint.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  derprint.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/moreoids.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  moreoids.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pppolicy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pppolicy.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ffs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ffs.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11table.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11table.c
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsectool.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsectool.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/basicutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secpwd.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derprint.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/moreoids.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pppolicy.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ffs.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11table.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsectool.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsectool.a
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsectool.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/lib'
cd bltest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/bltest'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/blapitest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/softoken  blapitest.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bltest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/softoken  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/blapitest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a  /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a  /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a   -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bltest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/bltest'
cd fipstest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/fipstest'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  fipstest.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a  /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a  /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a   -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/fipstest'
cd lowhashtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/lowhashtest'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowhashtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../nss/lib/freebl -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/softoken  lowhashtest.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowhashtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../nss/lib/freebl -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/softoken  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowhashtest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -L/<<PKGBUILDDIR>>/dist/lib -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -lfreebl3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowhashtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/lowhashtest'
cd shlibsign; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/shlibsign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  shlibsign.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/shlibsign -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/shlibsign.o -Wl,-z,relro  -Wl,-z,defs  -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/shlibsign /<<PKGBUILDDIR>>/dist/bin
cd mangle; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign/mangle'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mangle.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  mangle.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mangle -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mangle.o -Wl,-z,relro  -Wl,-z,defs  -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mangle /<<PKGBUILDDIR>>/dist/bin
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign/mangle'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign'
cd addbuiltin; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/addbuiltin'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/addbuiltin.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd  addbuiltin.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/addbuiltin -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/addbuiltin.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/addbuiltin /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/addbuiltin'
cd atob; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/atob'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/atob.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  atob.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/atob -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/atob.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/atob /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/atob'
cd btoa; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/btoa'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoa.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  btoa.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoa -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoa.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoa /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/btoa'
cd certcgi; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/certcgi'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certcgi.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  certcgi.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certcgi -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certcgi.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a  /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a  /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a   -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certcgi /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/certcgi'
cd certutil; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/certutil'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certext.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  certext.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  certutil.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keystuff.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  keystuff.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certext.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keystuff.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certutil /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/certutil'
cd chktest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/chktest'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/chktest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  chktest.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/chktest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/chktest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a  /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a  /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a   -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/chktest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/chktest'
cd crlutil; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/crlutil'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlgen_lex.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  crlgen_lex.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlgen.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  crlgen.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  crlutil.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlgen.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlutil.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlutil /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/crlutil'
cd crmftest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/crmftest'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/testcrmf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  testcrmf.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmftest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/testcrmf.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libcrmf.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmftest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/crmftest'
cd dbtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/dbtest'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  dbtest.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbtest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/dbtest'
cd derdump; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/derdump'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdump.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  derdump.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdump -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdump.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdump /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/derdump'
cd digest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/digest'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/digest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  digest.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/digest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/digest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/digest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/digest'
cd ecperf; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ecperf'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ecperf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  ecperf.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ecperf -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ecperf.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a  /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a  /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a   -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ecperf /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ecperf'
cd ectest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ectest'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ectest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  ectest.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ectest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ectest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a  /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a  /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a   -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ectest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ectest'
cd httpserv; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/httpserv'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/httpserv.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  httpserv.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/httpserv -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/httpserv.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/httpserv /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/httpserv'
cd listsuites; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/listsuites'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/listsuites.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  listsuites.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/listsuites -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/listsuites.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/listsuites /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/listsuites'
cd makepqg; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/makepqg'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/makepqg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  makepqg.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/makepqg -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/makepqg.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/makepqg /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/makepqg'
cd multinit; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/multinit'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/multinit.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss   multinit.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/multinit -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss   Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/multinit.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/multinit /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/multinit'
cd ocspclnt; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ocspclnt'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspclnt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  ocspclnt.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspclnt -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspclnt.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspclnt /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ocspclnt'
cd ocspresp; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ocspresp'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspresp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  ocspresp.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspresp -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspresp.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspresp /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ocspresp'
cd oidcalc; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/oidcalc'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidcalc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  oidcalc.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidcalc -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidcalc.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidcalc /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/oidcalc'
cd p7content; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7content'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7content.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  p7content.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7content -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7content.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7content /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7content'
cd p7env; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7env'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7env.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  p7env.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7env -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7env.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7env /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7env'
cd p7sign; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7sign'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7sign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  p7sign.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7sign -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7sign.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7sign /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7sign'
cd p7verify; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7verify'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7verify.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  p7verify.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7verify -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7verify.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7verify /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7verify'
cd pk12util; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk12util'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk12util.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  pk12util.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk12util -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk12util.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk12util /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk12util'
cd pk11gcmtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk11gcmtest'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11gcmtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  pk11gcmtest.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11gcmtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11gcmtest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11gcmtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk11gcmtest'
cd pk11mode; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk11mode'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  pk11mode.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mode -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mode.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mode /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk11mode'
cd pk1sign; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk1sign'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk1sign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  pk1sign.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk1sign -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk1sign.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk1sign /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk1sign'
cd pp; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pp'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  pp.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pp -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pp.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pp /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pp'
cd pwdecrypt; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pwdecrypt'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pwdecrypt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  pwdecrypt.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pwdecrypt -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pwdecrypt.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pwdecrypt /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pwdecrypt'
cd rsaperf; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/rsaperf'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/rsaperf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  rsaperf.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/defkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  defkey.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/rsaperf -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/rsaperf.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/defkey.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a  /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a  /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a   -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/rsaperf /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/rsaperf'
cd sdrtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/sdrtest'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdrtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  sdrtest.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdrtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdrtest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdrtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/sdrtest'
cd selfserv; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/selfserv'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/selfserv.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  selfserv.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/selfserv -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/selfserv.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/selfserv /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/selfserv'
cd signtool; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/signtool'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signtool.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  signtool.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certgen.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  certgen.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/javascript.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  javascript.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  list.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  sign.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  util.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/verify.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  verify.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/zip.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  zip.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signtool -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signtool.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certgen.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/javascript.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sign.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/verify.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/zip.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libjar.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc -lz
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signtool /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/signtool'
cd signver; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/signver'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  signver.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk7print.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  pk7print.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signver -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signver.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk7print.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signver /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/signver'
cd smimetools; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/smimetools'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  cmsutil.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/smimetools'
cd ssltap; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ssltap'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  ssltap.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltap -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltap.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltap /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ssltap'
cd strsclnt; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/strsclnt'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/strsclnt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  strsclnt.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/strsclnt -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/strsclnt.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/strsclnt /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/strsclnt'
cd symkeyutil; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/symkeyutil'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symkeyutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  symkeyutil.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symkeyutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss  -I/<<PKGBUILDDIR>>/dist/private/nss  -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symkeyutil.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symkeyutil /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/symkeyutil'
cd tests; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/tests'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/baddbdir.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  baddbdir.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/baddbdir -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/baddbdir.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/conflict.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  conflict.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/conflict -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/conflict.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertimetest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  dertimetest.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertimetest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertimetest.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encodeinttest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  encodeinttest.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encodeinttest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encodeinttest.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nonspr10.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  nonspr10.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nonspr10 -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nonspr10.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/remtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  remtest.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/remtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/remtest.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmodtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  secmodtest.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmodtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmodtest.o \
	-Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/baddbdir Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/conflict Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertimetest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encodeinttest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nonspr10 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/remtest Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmodtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/tests'
cd tstclnt; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/tstclnt'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tstclnt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  tstclnt.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tstclnt -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tstclnt.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tstclnt /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/tstclnt'
cd vfychain; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/vfychain'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfychain.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  vfychain.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfychain -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfychain.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfychain /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/vfychain'
cd vfyserv; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/vfyserv'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyserv.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  vfyserv.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  vfyutil.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyserv -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyserv.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyutil.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyserv /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/vfyserv'
cd modutil; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/modutil'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/modutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm  modutil.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm  pk11.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/instsec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm  instsec.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/install.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm  install.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/installparse.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm  installparse.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/install-ds.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm  install-ds.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm  lex.Pk11Install_yy.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/modutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/modutil.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/instsec.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/install.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/installparse.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/install-ds.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libjar.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc -lz
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/modutil /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/modutil'
cd pkix-errcodes; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pkix-errcodes'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix-errcodes.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  pkix-errcodes.c
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix-errcodes -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix-errcodes.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix-errcodes /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pkix-errcodes'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd'
cd external_tests; /usr/bin/make libs
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests'
cd google_test; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/google_test'
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -Igtest/include/ -Igtest -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/gtest -I/<<PKGBUILDDIR>>/dist/private/gtest  -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x gtest/src/gtest-all.cc
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest.a
ar cr Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest.a Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o
echo Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest.a
Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest.a
rm -f Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest1.so
g++-4.7 -shared -Wl,-z,relro  -Wl,-z,defs  -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest1.so Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o   /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest1.so
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest.a /<<PKGBUILDDIR>>/dist/lib
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest1.so /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/google_test'
cd common; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/common'
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/gtest  -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x gtests.cc
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/gtest  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libgtest.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/common'
cd der_gtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/der_gtest'
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/der_getint_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x der_getint_unittest.cc
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/der_gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/der_getint_unittest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libgtest.a  ../common/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests.o /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/der_gtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/der_gtest'
cd util_gtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/util_gtest'
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_utf8_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common  -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/util -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x util_utf8_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_b64_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common  -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/util -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x util_b64_unittest.cc
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common  -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/util Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_utf8_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_b64_unittest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libgtest.a /<<PKGBUILDDIR>>/dist/lib/libnssutil.a ../common/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests.o  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_gtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/util_gtest'
cd pk11_gtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/pk11_gtest'
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_aeskeywrap_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x pk11_aeskeywrap_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_chacha20poly1305_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x pk11_chacha20poly1305_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_pbkdf2_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x pk11_pbkdf2_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_prf_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x pk11_prf_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_rsapss_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x pk11_rsapss_unittest.cc
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_aeskeywrap_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_chacha20poly1305_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_pbkdf2_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_prf_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_rsapss_unittest.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libgtest.a  ../common/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests.o /<<PKGBUILDDIR>>/dist/lib/libsectool.a  -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_gtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/pk11_gtest'
cd ssl_gtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/ssl_gtest'
gcc-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl_internals.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl libssl_internals.c
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_0rtt_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_0rtt_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_agent_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_agent_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_auth_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_auth_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_ciphersuite_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_ciphersuite_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_dhe_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_dhe_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_drop_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_drop_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_ems_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_ems_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_extension_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_extension_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_gtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_gtest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_loopback_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_loopback_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_resumption_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_resumption_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_skip_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_skip_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_staticrsa_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_staticrsa_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_v2_client_hello_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_v2_client_hello_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_version_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_version_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/test_io.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x test_io.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_agent.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x tls_agent.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_connect.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x tls_connect.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_hkdf_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x tls_hkdf_unittest.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_filter.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x tls_filter.cc
if test ! -d Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_parser.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x tls_parser.cc
g++-4.7 -o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1  -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest  -I../../lib/ssl Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl_internals.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_agent_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_auth_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_ciphersuite_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_dhe_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_drop_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_ems_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_extension_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_gtest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_loopback_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_resumption_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_skip_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_staticrsa_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_v2_client_hello_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_version_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/test_io.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_agent.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_connect.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_hkdf_unittest.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_filter.o Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_parser.o -Wl,-z,relro  -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libgtest.a /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a  /<<PKGBUILDDIR>>/dist/lib/libsectool.a  /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a  /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a  /<<PKGBUILDDIR>>/dist/lib/libfreebl.a  /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a   -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc -lz
../../coreconf/nsinstall/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_gtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/ssl_gtest'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests'
make[2]: Leaving directory `/<<PKGBUILDDIR>>/nss'
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
   debian/rules override_dh_auto_test
make[1]: Entering directory `/<<PKGBUILDDIR>>'
# Create .chk files for FIPS mode tests
cd /<<PKGBUILDDIR>>/dist/lib; LD_LIBRARY_PATH=/<<PKGBUILDDIR>>/dist/lib /<<PKGBUILDDIR>>/dist/bin/shlibsign -v -i libsoftokn3.so
Library File: ../../nss/lib/softoken/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.so 1004927 bytes
Check File: ../../nss/lib/softoken/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.chk
Link: libsoftokn3.chk
  hash: 32 bytes
    26 d2 ed ed 76 7b 54 71 bb 6b
    36 30 0b 19 bb bc 63 07 f8 8b
    96 6d 98 93 0c 26 ca 39 f6 31
    4a e4
  signature: 64 bytes
    09 83 74 b0 83 82 77 cb 7a ff
    c3 f4 75 2a e9 6f 11 12 35 7e
    55 8a cf 1f 4c dd 5d cb 08 98
    f5 14 08 3b a2 7c fc 99 e9 e6
    a2 34 de d5 ec 66 fe 45 0f 89
    46 8e 03 29 e1 c4 2b 32 0d 04
    5c 46 b1 66
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
cd /<<PKGBUILDDIR>>/dist/lib; LD_LIBRARY_PATH=/<<PKGBUILDDIR>>/dist/lib /<<PKGBUILDDIR>>/dist/bin/shlibsign -v -i libfreebl3.so
Library File: ../../nss/lib/freebl/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so 44007 bytes
Check File: ../../nss/lib/freebl/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.chk
Link: libfreebl3.chk
  hash: 32 bytes
    35 4d 65 1a a5 4a c8 ed 85 b1
    33 f3 9b 77 ef 17 38 d6 52 10
    53 99 05 a4 da 83 c5 29 c7 5c
    36 42
  signature: 64 bytes
    36 df fa 3c 91 9b 2f 31 f8 ce
    ff 32 f7 ff 67 8e 80 0a 98 79
    fb d4 91 8d 4d 73 16 e7 f0 1e
    f5 47 81 9f b7 65 c5 93 8f 2c
    3a f2 b4 10 e9 2e a7 3e 85 79
    1e cc e0 c3 86 46 9f bf 13 b4
    7d ed 14 e7
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
cd /<<PKGBUILDDIR>>/dist/lib; LD_LIBRARY_PATH=/<<PKGBUILDDIR>>/dist/lib /<<PKGBUILDDIR>>/dist/bin/shlibsign -v -i libfreeblpriv3.so
Library File: ../../nss/lib/freebl/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so 1449570 bytes
Check File: ../../nss/lib/freebl/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.chk
Link: libfreeblpriv3.chk
  hash: 32 bytes
    70 2f 0c 5e 29 98 aa e6 12 99
    43 16 a1 f5 67 47 35 c9 9f b2
    76 26 c2 a4 18 b3 9b 2d 5e 98
    d3 46
  signature: 64 bytes
    6e c2 0f af 37 42 b4 f2 fc 8a
    85 fa 2b e5 0e 0c fc 07 c6 32
    84 88 40 ad 45 71 0e ce da f2
    f5 f7 21 60 91 29 1b e4 08 cf
    05 de 5e 28 4c 75 72 74 05 06
    a5 29 94 94 e2 09 04 4a c4 9b
    a0 dd 6e 3c
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
cd /<<PKGBUILDDIR>>/dist/lib; LD_LIBRARY_PATH=/<<PKGBUILDDIR>>/dist/lib /<<PKGBUILDDIR>>/dist/bin/shlibsign -v -i libnssdbm3.so
Library File: ../../nss/lib/softoken/legacydb/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.so 754611 bytes
Check File: ../../nss/lib/softoken/legacydb/Linux4.9_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.chk
Link: libnssdbm3.chk
  hash: 32 bytes
    49 0b f9 8e 36 7d 46 29 20 1c
    7d 51 a7 ae b6 e2 4d 4d 02 52
    66 c5 cd 11 e9 de 12 96 db 12
    d6 3c
  signature: 64 bytes
    83 68 d1 c5 27 e9 8c 40 6c 58
    54 2f f0 d5 b2 88 1f b9 ae 53
    e1 42 2e 2b cb 51 cd 6f c0 c9
    cc a6 5b 99 26 af e5 e4 26 88
    cd 14 19 67 ca 66 22 3b fa 77
    13 d1 c0 c8 e6 fd 4c 78 e0 59
    38 e4 1b ba
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
# Run tests
export DIST=/<<PKGBUILDDIR>>         &&\
	export OBJDIR=dist            &&\
	export IP_ADDRESS=127.0.0.1   &&\
	export USE_IP=TRUE            &&\
	export NSS_CYCLES=standard    &&\
	cd /<<PKGBUILDDIR>>/nss/tests        && ./all.sh
../../coreconf/Werror.mk:90: Unable to find gcc 4.8 or greater, disabling -Werror
../../coreconf/Werror.mk:90: Unable to find gcc 4.8 or greater, disabling -Werror
../../coreconf/Werror.mk:90: Unable to find gcc 4.8 or greater, disabling -Werror
testdir is /<<PKGBUILDDIR>>/tests_results/security
init.sh init: Creating /<<PKGBUILDDIR>>/tests_results/security
********************************************
   Platform: dist
   Results: testbuildd.1
********************************************

init.sh init: Testing PATH .:/<<PKGBUILDDIR>>/dist/bin:/<<PKGBUILDDIR>>/dist/lib:/bin:/usr/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/usr/games against LIB /<<PKGBUILDDIR>>/dist/lib:
Running tests for cipher
TIMESTAMP cipher BEGIN: Fri May 19 16:54:21 UTC 2017
cipher.sh: Cipher Tests ===============================
cipher.sh: DES ECB Encrypt --------------------------------
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des_ecb passed.
cipher.sh: #1: DES ECB Encrypt  - PASSED
cipher.sh: DES ECB Decrypt --------------------------------
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des_ecb passed.
cipher.sh: #2: DES ECB Decrypt  - PASSED
cipher.sh: DES CBC Encrypt --------------------------------
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des_cbc passed.
cipher.sh: #3: DES CBC Encrypt  - PASSED
cipher.sh: DES CBC Decrypt --------------------------------
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des_cbc passed.
cipher.sh: #4: DES CBC Decrypt  - PASSED
cipher.sh: DES3 ECB Encrypt --------------------------------
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des3_ecb passed.
cipher.sh: #5: DES3 ECB Encrypt  - PASSED
cipher.sh: DES3 ECB Decrypt --------------------------------
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des3_ecb passed.
cipher.sh: #6: DES3 ECB Decrypt  - PASSED
cipher.sh: DES3 CBC Encrypt --------------------------------
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des3_cbc passed.
cipher.sh: #7: DES3 CBC Encrypt  - PASSED
cipher.sh: DES3 CBC Decrypt --------------------------------
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des3_cbc passed.
cipher.sh: #8: DES3 CBC Decrypt  - PASSED
cipher.sh: AES ECB Encrypt --------------------------------
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
cipher.sh: #9: AES ECB Encrypt  - PASSED
cipher.sh: AES ECB Decrypt --------------------------------
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
cipher.sh: #10: AES ECB Decrypt  - PASSED
cipher.sh: AES CBC Encrypt --------------------------------
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
cipher.sh: #11: AES CBC Encrypt  - PASSED
cipher.sh: AES CBC Decrypt --------------------------------
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
cipher.sh: #12: AES CBC Decrypt  - PASSED
cipher.sh: AES CTR --------------------------------
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
cipher.sh: #13: AES CTR  - PASSED
cipher.sh: AES CTS --------------------------------
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
cipher.sh: #14: AES CTS  - PASSED
cipher.sh: AES GCM --------------------------------
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
cipher.sh: #15: AES GCM  - PASSED
cipher.sh: Camellia ECB Encrypt --------------------------------
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
cipher.sh: #16: Camellia ECB Encrypt  - PASSED
cipher.sh: Camellia ECB Decrypt --------------------------------
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
cipher.sh: #17: Camellia ECB Decrypt  - PASSED
cipher.sh: Camellia CBC Encrypt --------------------------------
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
cipher.sh: #18: Camellia CBC Encrypt  - PASSED
cipher.sh: Camellia CBC Decrypt --------------------------------
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
cipher.sh: #19: Camellia CBC Decrypt  - PASSED
cipher.sh: SEED ECB Encrypt --------------------------------
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for seed_ecb passed.
cipher.sh: #20: SEED ECB Encrypt  - PASSED
cipher.sh: SEED ECB Decrypt --------------------------------
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for seed_ecb passed.
cipher.sh: #21: SEED ECB Decrypt  - PASSED
cipher.sh: SEED CBC Encrypt --------------------------------
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for seed_cbc passed.
cipher.sh: #22: SEED CBC Encrypt  - PASSED
cipher.sh: SEED CBC Decrypt --------------------------------
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for seed_cbc passed.
cipher.sh: #23: SEED CBC Decrypt  - PASSED
cipher.sh: ChaCha20 Poly1305 Encrypt --------------------------------
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
cipher.sh: #24: ChaCha20 Poly1305 Encrypt  - PASSED
cipher.sh: ChaCha20 Poly1305 Decrypt --------------------------------
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
cipher.sh: #25: ChaCha20 Poly1305 Decrypt  - PASSED
cipher.sh: RC2 ECB Encrypt --------------------------------
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc2_ecb passed.
cipher.sh: #26: RC2 ECB Encrypt  - PASSED
cipher.sh: RC2 ECB Decrypt --------------------------------
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc2_ecb passed.
cipher.sh: #27: RC2 ECB Decrypt  - PASSED
cipher.sh: RC2 CBC Encrypt --------------------------------
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc2_cbc passed.
cipher.sh: #28: RC2 CBC Encrypt  - PASSED
cipher.sh: RC2 CBC Decrypt --------------------------------
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc2_cbc passed.
cipher.sh: #29: RC2 CBC Decrypt  - PASSED
cipher.sh: RC4 Encrypt --------------------------------
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
cipher.sh: #30: RC4 Encrypt  - PASSED
cipher.sh: RC4 Decrypt --------------------------------
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
cipher.sh: #31: RC4 Decrypt  - PASSED
cipher.sh: RSA Encrypt --------------------------------
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rsa passed.
cipher.sh: #32: RSA Encrypt  - PASSED
cipher.sh: RSA Decrypt --------------------------------
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rsa passed.
cipher.sh: #33: RSA Decrypt  - PASSED
cipher.sh: RSA EncryptOAEP --------------------------------
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
cipher.sh: #34: RSA EncryptOAEP  - PASSED
cipher.sh: RSA DecryptOAEP --------------------------------
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
cipher.sh: #35: RSA DecryptOAEP  - PASSED
cipher.sh: RSA SignPSS --------------------------------
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
cipher.sh: #36: RSA SignPSS  - PASSED
cipher.sh: RSA CheckSignPSS --------------------------------
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
cipher.sh: #37: RSA CheckSignPSS  - PASSED
cipher.sh: DSA Sign --------------------------------
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
cipher.sh: #38: DSA Sign  - PASSED
cipher.sh: DSA Verify --------------------------------
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
cipher.sh: #39: DSA Verify  - PASSED
cipher.sh: MD2 Hash --------------------------------
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for md2 passed.
cipher.sh: #40: MD2 Hash  - PASSED
cipher.sh: MD5 Hash --------------------------------
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for md5 passed.
cipher.sh: #41: MD5 Hash  - PASSED
cipher.sh: SHA1 Hash --------------------------------
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha1 passed.
cipher.sh: #42: SHA1 Hash  - PASSED
cipher.sh: SHA224 Hash --------------------------------
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
cipher.sh: #43: SHA224 Hash  - PASSED
cipher.sh: SHA256 Hash --------------------------------
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
cipher.sh: #44: SHA256 Hash  - PASSED
cipher.sh: SHA384 Hash --------------------------------
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
cipher.sh: #45: SHA384 Hash  - PASSED
cipher.sh: SHA512 Hash --------------------------------
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
cipher.sh: #46: SHA512 Hash  - PASSED
cipher.sh: NIST AES128 GCM Decrypt --------------------------------
pk11gcmtest aes kat gcm /<<PKGBUILDDIR>>/nss/tests/../cmd/pk11gcmtest/tests/gcmDecrypt128.rsp
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
46 test groups
PASS
cipher.sh: #47: NIST AES128 GCM Decrypt  - PASSED
cipher.sh: NIST AES192 GCM Decrypt --------------------------------
pk11gcmtest aes kat gcm /<<PKGBUILDDIR>>/nss/tests/../cmd/pk11gcmtest/tests/gcmDecrypt192.rsp
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
46 test groups
PASS
cipher.sh: #48: NIST AES192 GCM Decrypt  - PASSED
cipher.sh: NIST AES256 GCM Decrypt --------------------------------
pk11gcmtest aes kat gcm /<<PKGBUILDDIR>>/nss/tests/../cmd/pk11gcmtest/tests/gcmDecrypt256.rsp
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
46 test groups
PASS
cipher.sh: #49: NIST AES256 GCM Decrypt  - PASSED
cipher.sh: NIST AES128 GCM Encrypt --------------------------------
pk11gcmtest aes kat gcm /<<PKGBUILDDIR>>/nss/tests/../cmd/pk11gcmtest/tests/gcmEncryptExtIV128.rsp
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
46 test groups
PASS
cipher.sh: #50: NIST AES128 GCM Encrypt  - PASSED
cipher.sh: NIST AES192 GCM Encrypt --------------------------------
pk11gcmtest aes kat gcm /<<PKGBUILDDIR>>/nss/tests/../cmd/pk11gcmtest/tests/gcmEncryptExtIV192.rsp
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
46 test groups
PASS
cipher.sh: #51: NIST AES192 GCM Encrypt  - PASSED
cipher.sh: NIST AES256 GCM Encrypt --------------------------------
pk11gcmtest aes kat gcm /<<PKGBUILDDIR>>/nss/tests/../cmd/pk11gcmtest/tests/gcmEncryptExtIV256.rsp
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
46 test groups
PASS
cipher.sh: #52: NIST AES256 GCM Encrypt  - PASSED
TIMESTAMP cipher END: Fri May 19 16:59:18 UTC 2017
Running tests for lowhash
TIMESTAMP lowhash BEGIN: Fri May 19 16:59:18 UTC 2017
lowhash.sh: Lowhash Tests - /proc/sys/crypto/fips_enabled is 0 ===============================
lowhashtest with fips mode=0
lowhashtest MD5
lowhash.sh: #53: lowhashtest with fips mode=0 for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #54: lowhashtest with fips mode=0 for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #55: lowhashtest with fips mode=0 for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #56: lowhashtest with fips mode=0 for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #57: lowhashtest with fips mode=0 for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #58: lowhashtest with fips mode=0 for SHA512  - PASSED
lowhashtest with fips mode=1
lowhashtest MD5
lowhash.sh: #59: lowhashtest with fips mode=1 for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #60: lowhashtest with fips mode=1 for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #61: lowhashtest with fips mode=1 for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #62: lowhashtest with fips mode=1 for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #63: lowhashtest with fips mode=1 for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #64: lowhashtest with fips mode=1 for SHA512  - PASSED
lowhash.sh done
TIMESTAMP lowhash END: Fri May 19 16:59:22 UTC 2017
Running tests for libpkix
TIMESTAMP libpkix BEGIN: Fri May 19 16:59:22 UTC 2017
TIMESTAMP libpkix END: Fri May 19 16:59:22 UTC 2017
Running tests for cert
TIMESTAMP cert BEGIN: Fri May 19 16:59:22 UTC 2017
cert.sh: Certutil and Crlutil Tests with ECC ===============================
cert.sh: #65: Looking for root certs module. - PASSED
cert.sh: Creating a CA Certificate TestCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA -f ../tests.pw
cert.sh: #66: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #67: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert TestCA  --------------------------
certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #68: Creating CA Cert TestCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n TestCA -r -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA -o root.cert
cert.sh: #69: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate serverCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA -f ../tests.pw
cert.sh: #70: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #71: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert serverCA  --------------------------
certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #72: Creating CA Cert serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n serverCA -r -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA -o root.cert
cert.sh: #73: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-serverCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA
cert.sh: Creating CA Cert chain-1-serverCA  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #74: Creating CA Cert chain-1-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-serverCA -r -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA -o root.cert
cert.sh: #75: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-serverCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA
cert.sh: Creating CA Cert chain-2-serverCA  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #76: Creating CA Cert chain-2-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-serverCA -r -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA -o root.cert
cert.sh: #77: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate clientCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA -f ../tests.pw
cert.sh: #78: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #79: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert clientCA  --------------------------
certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #80: Creating CA Cert clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n clientCA -r -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA -o root.cert
cert.sh: #81: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-clientCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA
cert.sh: Creating CA Cert chain-1-clientCA  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #82: Creating CA Cert chain-1-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-clientCA -r -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA -o root.cert
cert.sh: #83: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-clientCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA
cert.sh: Creating CA Cert chain-2-clientCA  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #84: Creating CA Cert chain-2-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-clientCA -r -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA -o root.cert
cert.sh: #85: Exporting Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate TestCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA
cert.sh: Creating DSA CA Cert TestCA-dsa  --------------------------
certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #86: Creating DSA CA Cert TestCA-dsa  - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert
cert.sh: #87: Exporting DSA Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate serverCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA
cert.sh: Creating DSA CA Cert serverCA-dsa  --------------------------
certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #88: Creating DSA CA Cert serverCA-dsa  - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert
cert.sh: #89: Exporting DSA Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate chain-1-serverCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA
cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #90: Creating DSA CA Cert chain-1-serverCA-dsa  - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert
cert.sh: #91: Exporting DSA Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate chain-2-serverCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA
cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #92: Creating DSA CA Cert chain-2-serverCA-dsa  - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert
cert.sh: #93: Exporting DSA Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate clientCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA
cert.sh: Creating DSA CA Cert clientCA-dsa  --------------------------
certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #94: Creating DSA CA Cert clientCA-dsa  - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert
cert.sh: #95: Exporting DSA Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate chain-1-clientCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA
cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #96: Creating DSA CA Cert chain-1-clientCA-dsa  - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert
cert.sh: #97: Exporting DSA Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate chain-2-clientCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA
cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #98: Creating DSA CA Cert chain-2-clientCA-dsa  - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert
cert.sh: #99: Exporting DSA Root Cert - PASSED
cert.sh: Creating an EC CA Certificate TestCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA
cert.sh: Creating EC CA Cert TestCA-ec  --------------------------
certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #100: Creating EC CA Cert TestCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n TestCA-ec -r -d . -o ecroot.cert
cert.sh: #101: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate serverCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA
cert.sh: Creating EC CA Cert serverCA-ec  --------------------------
certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #102: Creating EC CA Cert serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n serverCA-ec -r -d . -o ecroot.cert
cert.sh: #103: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA
cert.sh: Creating EC CA Cert chain-1-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #104: Creating EC CA Cert chain-1-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #105: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA
cert.sh: Creating EC CA Cert chain-2-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #106: Creating EC CA Cert chain-2-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #107: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate clientCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA
cert.sh: Creating EC CA Cert clientCA-ec  --------------------------
certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #108: Creating EC CA Cert clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n clientCA-ec -r -d . -o ecroot.cert
cert.sh: #109: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA
cert.sh: Creating EC CA Cert chain-1-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #110: Creating EC CA Cert chain-1-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #111: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA
cert.sh: Creating EC CA Cert chain-2-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #112: Creating EC CA Cert chain-2-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #113: Exporting EC Root Cert - PASSED
cert.sh: Creating Certificates, issued by the last ===============
     of a chain of CA's which are not in the same database============
Server Cert
cert.sh: Initializing 127.0.0.1's Cert DB (ext.) --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -f ../tests.pw
cert.sh: #114: Initializing 127.0.0.1's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to 127.0.0.1's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #115: Loading root cert module to 127.0.0.1's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for 127.0.0.1 (ext) --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #116: Generate Cert Request for 127.0.0.1 (ext) - PASSED
cert.sh: Sign 127.0.0.1's Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 200 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA -i req -o 127.0.0.1.cert -f ../tests.pw
cert.sh: #117: Sign 127.0.0.1's Request (ext) - PASSED
cert.sh: Import 127.0.0.1's Cert  -t u,u,u (ext) --------------------------
certutil -A -n 127.0.0.1 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -f ../tests.pw -i 127.0.0.1.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #118: Import 127.0.0.1's Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client Root CA -t T,, for 127.0.0.1 (ext.) --------------------------
certutil -A -n clientCA -t T,, -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA/clientCA.ca.cert
cert.sh: #119: Import Client Root CA -t T,, for 127.0.0.1 (ext.) - PASSED
cert.sh: Generate DSA Cert Request for 127.0.0.1 (ext) --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #120: Generate DSA Cert Request for 127.0.0.1 (ext) - PASSED
cert.sh: Sign 127.0.0.1's DSA Request (ext) --------------------------
certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA -i req -o 127.0.0.1-dsa.cert -f ../tests.pw
cert.sh: #121: Sign 127.0.0.1's DSA Request (ext) - PASSED
cert.sh: Import 127.0.0.1's DSA Cert  -t u,u,u (ext) --------------------------
certutil -A -n 127.0.0.1-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -f ../tests.pw -i 127.0.0.1-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #122: Import 127.0.0.1's DSA Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client DSA Root CA -t T,, for 127.0.0.1 (ext.) --------------------------
certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA/clientCA-dsa.ca.cert
cert.sh: #123: Import Client DSA Root CA -t T,, for 127.0.0.1 (ext.) - PASSED
cert.sh: Generate mixed DSA Cert Request for 127.0.0.1 (ext) --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #124: Generate mixed DSA Cert Request for 127.0.0.1 (ext) - PASSED
cert.sh: Sign 127.0.0.1's mixed DSA Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 202 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA -i req -o 127.0.0.1-dsamixed.cert -f ../tests.pw
cert.sh: #125: Sign 127.0.0.1's mixed DSA Request (ext) - PASSED
cert.sh: Import 127.0.0.1's mixed DSA Cert  -t u,u,u (ext) --------------------------
certutil -A -n 127.0.0.1-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -f ../tests.pw -i 127.0.0.1-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #126: Import 127.0.0.1's mixed DSA Cert  -t u,u,u (ext) - PASSED
cert.sh: Generate EC Cert Request for 127.0.0.1 (ext) --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #127: Generate EC Cert Request for 127.0.0.1 (ext) - PASSED
cert.sh: Sign 127.0.0.1's EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA -i req -o 127.0.0.1-ec.cert -f ../tests.pw
cert.sh: #128: Sign 127.0.0.1's EC Request (ext) - PASSED
cert.sh: Import 127.0.0.1's EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n 127.0.0.1-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -f ../tests.pw -i 127.0.0.1-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #129: Import 127.0.0.1's EC Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client EC Root CA -t T,, for 127.0.0.1 (ext.) --------------------------
certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA/clientCA-ec.ca.cert
cert.sh: #130: Import Client EC Root CA -t T,, for 127.0.0.1 (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for 127.0.0.1 (ext) --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #131: Generate mixed EC Cert Request for 127.0.0.1 (ext) - PASSED
cert.sh: Sign 127.0.0.1's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 201 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA -i req -o 127.0.0.1-ecmixed.cert -f ../tests.pw
cert.sh: #132: Sign 127.0.0.1's mixed EC Request (ext) - PASSED
cert.sh: Import 127.0.0.1's mixed EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n 127.0.0.1-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -f ../tests.pw -i 127.0.0.1-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #133: Import 127.0.0.1's mixed EC Cert  -t u,u,u (ext) - PASSED
Importing all the server's own CA chain into the servers DB
cert.sh: Import serverCA CA -t C,C,C for 127.0.0.1 (ext.)  --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA/serverCA.ca.cert
cert.sh: #134: Import serverCA CA -t C,C,C for 127.0.0.1 (ext.)  - PASSED
cert.sh: Import chain-1-serverCA CA -t u,u,u for 127.0.0.1 (ext.)  --------------------------
certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA/chain-1-serverCA.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #135: Import chain-1-serverCA CA -t u,u,u for 127.0.0.1 (ext.)  - PASSED
cert.sh: Import chain-2-serverCA CA -t u,u,u for 127.0.0.1 (ext.)  --------------------------
certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA/chain-2-serverCA.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #136: Import chain-2-serverCA CA -t u,u,u for 127.0.0.1 (ext.)  - PASSED
cert.sh: Import serverCA-dsa CA -t C,C,C for 127.0.0.1 (ext.)  --------------------------
certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA/serverCA-dsa.ca.cert
cert.sh: #137: Import serverCA-dsa CA -t C,C,C for 127.0.0.1 (ext.)  - PASSED
cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for 127.0.0.1 (ext.)  --------------------------
certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA/chain-1-serverCA-dsa.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #138: Import chain-1-serverCA-dsa CA -t u,u,u for 127.0.0.1 (ext.)  - PASSED
cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for 127.0.0.1 (ext.)  --------------------------
certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA/chain-2-serverCA-dsa.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #139: Import chain-2-serverCA-dsa CA -t u,u,u for 127.0.0.1 (ext.)  - PASSED
cert.sh: Import serverCA-ec CA -t C,C,C for 127.0.0.1 (ext.)  --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA/serverCA-ec.ca.cert
cert.sh: #140: Import serverCA-ec CA -t C,C,C for 127.0.0.1 (ext.)  - PASSED
cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for 127.0.0.1 (ext.)  --------------------------
certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA/chain-1-serverCA-ec.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #141: Import chain-1-serverCA-ec CA -t u,u,u for 127.0.0.1 (ext.)  - PASSED
cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for 127.0.0.1 (ext.)  --------------------------
certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA/chain-2-serverCA-ec.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #142: Import chain-2-serverCA-ec CA -t u,u,u for 127.0.0.1 (ext.)  - PASSED
Client Cert
cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -f ../tests.pw
cert.sh: #143: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #144: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #145: Generate Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 300 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw
cert.sh: #146: Sign ExtendedSSLUser's Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #147: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA/serverCA.ca.cert
cert.sh: #148: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #149: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's DSA Request (ext) --------------------------
certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw
cert.sh: #150: Sign ExtendedSSLUser's DSA Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #151: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA/serverCA-dsa.ca.cert
cert.sh: #152: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #153: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 302 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw
cert.sh: #154: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #155: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED
cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #156: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw
cert.sh: #157: Sign ExtendedSSLUser's EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #158: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA/serverCA-ec.ca.cert
cert.sh: #159: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #160: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 301 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw
cert.sh: #161: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #162: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED
Importing all the client's own CA chain into the servers DB
cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA/clientCA.ca.cert
cert.sh: #163: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA/chain-1-clientCA.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #164: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA/chain-2-clientCA.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #165: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA/clientCA-dsa.ca.cert
cert.sh: #166: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA/chain-1-clientCA-dsa.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #167: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA/chain-2-clientCA-dsa.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #168: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA/clientCA-ec.ca.cert
cert.sh: #169: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA/chain-1-clientCA-ec.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #170: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/clientCA/chain-2-clientCA-ec.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #171: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh SUCCESS: EXT passed
cert.sh: Creating Client CA Issued Certificates ===============
cert.sh: Initializing TestUser's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw
cert.sh: #172: Initializing TestUser's Cert DB - PASSED
cert.sh: Loading root cert module to TestUser's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #173: Loading root cert module to TestUser's Cert DB - PASSED
cert.sh: Import Root CA for TestUser --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -i ../CA/TestCA.ca.cert
cert.sh: #174: Import Root CA for TestUser - PASSED
cert.sh: Import DSA Root CA for TestUser --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -i ../CA/TestCA-dsa.ca.cert
cert.sh: #175: Import DSA Root CA for TestUser - PASSED
cert.sh: Import EC Root CA for TestUser --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -i ../CA/TestCA-ec.ca.cert
cert.sh: #176: Import EC Root CA for TestUser - PASSED
cert.sh: Generate Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #177: Generate Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's Request --------------------------
certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw 
cert.sh: #178: Sign TestUser's Request - PASSED
cert.sh: Import TestUser's Cert --------------------------
certutil -A -n TestUser -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #179: Import TestUser's Cert - PASSED
cert.sh SUCCESS: TestUser's Cert Created
cert.sh: Generate DSA Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #180: Generate DSA Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw 
cert.sh: #181: Sign TestUser's DSA Request - PASSED
cert.sh: Import TestUser's DSA Cert --------------------------
certutil -A -n TestUser-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #182: Import TestUser's DSA Cert - PASSED
cert.sh SUCCESS: TestUser's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #183: Generate mixed DSA Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw 
cert.sh: #184: Sign TestUser's DSA Request with RSA - PASSED
cert.sh: Import TestUser's mixed DSA Cert --------------------------
certutil -A -n TestUser-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #185: Import TestUser's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #186: Generate EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request --------------------------
certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw 
cert.sh: #187: Sign TestUser's EC Request - PASSED
cert.sh: Import TestUser's EC Cert --------------------------
certutil -A -n TestUser-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #188: Import TestUser's EC Cert - PASSED
cert.sh SUCCESS: TestUser's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #189: Generate mixed EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw 
cert.sh: #190: Sign TestUser's EC Request with RSA - PASSED
cert.sh: Import TestUser's mixed EC Cert --------------------------
certutil -A -n TestUser-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #191: Import TestUser's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             127.0.0.1 ------------------------------------
cert.sh: Initializing 127.0.0.1's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw
cert.sh: #192: Initializing 127.0.0.1's Cert DB - PASSED
cert.sh: Loading root cert module to 127.0.0.1's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #193: Loading root cert module to 127.0.0.1's Cert DB - PASSED
cert.sh: Import Root CA for 127.0.0.1 --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -i ../CA/TestCA.ca.cert
cert.sh: #194: Import Root CA for 127.0.0.1 - PASSED
cert.sh: Import DSA Root CA for 127.0.0.1 --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -i ../CA/TestCA-dsa.ca.cert
cert.sh: #195: Import DSA Root CA for 127.0.0.1 - PASSED
cert.sh: Import EC Root CA for 127.0.0.1 --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -i ../CA/TestCA-ec.ca.cert
cert.sh: #196: Import EC Root CA for 127.0.0.1 - PASSED
cert.sh: Generate Cert Request for 127.0.0.1 --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #197: Generate Cert Request for 127.0.0.1 - PASSED
cert.sh: Sign 127.0.0.1's Request --------------------------
certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o 127.0.0.1.cert -f ../tests.pw 
cert.sh: #198: Sign 127.0.0.1's Request - PASSED
cert.sh: Import 127.0.0.1's Cert --------------------------
certutil -A -n 127.0.0.1 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -i 127.0.0.1.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #199: Import 127.0.0.1's Cert - PASSED
cert.sh SUCCESS: 127.0.0.1's Cert Created
cert.sh: Generate DSA Cert Request for 127.0.0.1 --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #200: Generate DSA Cert Request for 127.0.0.1 - PASSED
cert.sh: Sign 127.0.0.1's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o 127.0.0.1-dsa.cert -f ../tests.pw 
cert.sh: #201: Sign 127.0.0.1's DSA Request - PASSED
cert.sh: Import 127.0.0.1's DSA Cert --------------------------
certutil -A -n 127.0.0.1-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -i 127.0.0.1-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #202: Import 127.0.0.1's DSA Cert - PASSED
cert.sh SUCCESS: 127.0.0.1's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for 127.0.0.1 --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #203: Generate mixed DSA Cert Request for 127.0.0.1 - PASSED
cert.sh: Sign 127.0.0.1's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o 127.0.0.1-dsamixed.cert -f ../tests.pw 
cert.sh: #204: Sign 127.0.0.1's DSA Request with RSA - PASSED
cert.sh: Import 127.0.0.1's mixed DSA Cert --------------------------
certutil -A -n 127.0.0.1-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -i 127.0.0.1-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #205: Import 127.0.0.1's mixed DSA Cert - PASSED
cert.sh SUCCESS: 127.0.0.1's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for 127.0.0.1 --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #206: Generate EC Cert Request for 127.0.0.1 - PASSED
cert.sh: Sign 127.0.0.1's EC Request --------------------------
certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o 127.0.0.1-ec.cert -f ../tests.pw 
cert.sh: #207: Sign 127.0.0.1's EC Request - PASSED
cert.sh: Import 127.0.0.1's EC Cert --------------------------
certutil -A -n 127.0.0.1-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -i 127.0.0.1-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #208: Import 127.0.0.1's EC Cert - PASSED
cert.sh SUCCESS: 127.0.0.1's EC Cert Created
cert.sh: Generate mixed EC Cert Request for 127.0.0.1 --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #209: Generate mixed EC Cert Request for 127.0.0.1 - PASSED
cert.sh: Sign 127.0.0.1's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o 127.0.0.1-ecmixed.cert -f ../tests.pw 
cert.sh: #210: Sign 127.0.0.1's EC Request with RSA - PASSED
cert.sh: Import 127.0.0.1's mixed EC Cert --------------------------
certutil -A -n 127.0.0.1-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -i 127.0.0.1-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #211: Import 127.0.0.1's mixed EC Cert - PASSED
cert.sh SUCCESS: 127.0.0.1's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             127.0.0.1-sni --------------------------------
cert.sh: Generate Cert Request for testbuildd-sni.(none) --------------------------
certutil -s "CN=testbuildd-sni.(none), E=testbuildd-sni.(none)@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #212: Generate Cert Request for testbuildd-sni.(none) - PASSED
cert.sh: Sign testbuildd-sni.(none)'s Request --------------------------
certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o testbuildd-sni.(none).cert -f ../tests.pw 
cert.sh: #213: Sign testbuildd-sni.(none)'s Request - PASSED
cert.sh: Import testbuildd-sni.(none)'s Cert --------------------------
certutil -A -n testbuildd-sni.(none) -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -i testbuildd-sni.(none).cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #214: Import testbuildd-sni.(none)'s Cert - PASSED
cert.sh SUCCESS: testbuildd-sni.(none)'s Cert Created
cert.sh: Generate DSA Cert Request for testbuildd-sni.(none) --------------------------
certutil -s "CN=testbuildd-sni.(none), E=testbuildd-sni.(none)-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #215: Generate DSA Cert Request for testbuildd-sni.(none) - PASSED
cert.sh: Sign testbuildd-sni.(none)'s DSA Request --------------------------
certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o testbuildd-sni.(none)-dsa.cert -f ../tests.pw 
cert.sh: #216: Sign testbuildd-sni.(none)'s DSA Request - PASSED
cert.sh: Import testbuildd-sni.(none)'s DSA Cert --------------------------
certutil -A -n testbuildd-sni.(none)-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -i testbuildd-sni.(none)-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #217: Import testbuildd-sni.(none)'s DSA Cert - PASSED
cert.sh SUCCESS: testbuildd-sni.(none)'s DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for testbuildd-sni.(none) --------------------------
certutil -s "CN=testbuildd-sni.(none), E=testbuildd-sni.(none)-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #218: Generate mixed DSA Cert Request for testbuildd-sni.(none) - PASSED
cert.sh: Sign testbuildd-sni.(none)'s DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o testbuildd-sni.(none)-dsamixed.cert -f ../tests.pw 
cert.sh: #219: Sign testbuildd-sni.(none)'s DSA Request with RSA - PASSED
cert.sh: Import testbuildd-sni.(none)'s mixed DSA Cert --------------------------
certutil -A -n testbuildd-sni.(none)-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -i testbuildd-sni.(none)-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #220: Import testbuildd-sni.(none)'s mixed DSA Cert - PASSED
cert.sh SUCCESS: testbuildd-sni.(none)'s mixed DSA Cert Created
cert.sh: Generate EC Cert Request for testbuildd-sni.(none) --------------------------
certutil -s "CN=testbuildd-sni.(none), E=testbuildd-sni.(none)-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #221: Generate EC Cert Request for testbuildd-sni.(none) - PASSED
cert.sh: Sign testbuildd-sni.(none)'s EC Request --------------------------
certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o testbuildd-sni.(none)-ec.cert -f ../tests.pw 
cert.sh: #222: Sign testbuildd-sni.(none)'s EC Request - PASSED
cert.sh: Import testbuildd-sni.(none)'s EC Cert --------------------------
certutil -A -n testbuildd-sni.(none)-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -i testbuildd-sni.(none)-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #223: Import testbuildd-sni.(none)'s EC Cert - PASSED
cert.sh SUCCESS: testbuildd-sni.(none)'s EC Cert Created
cert.sh: Generate mixed EC Cert Request for testbuildd-sni.(none) --------------------------
certutil -s "CN=testbuildd-sni.(none), E=testbuildd-sni.(none)-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #224: Generate mixed EC Cert Request for testbuildd-sni.(none) - PASSED
cert.sh: Sign testbuildd-sni.(none)'s EC Request with RSA --------------------------
certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o testbuildd-sni.(none)-ecmixed.cert -f ../tests.pw 
cert.sh: #225: Sign testbuildd-sni.(none)'s EC Request with RSA - PASSED
cert.sh: Import testbuildd-sni.(none)'s mixed EC Cert --------------------------
certutil -A -n testbuildd-sni.(none)-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw -i testbuildd-sni.(none)-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #226: Import testbuildd-sni.(none)'s mixed EC Cert - PASSED
cert.sh SUCCESS: testbuildd-sni.(none)'s mixed EC Cert Created
cert.sh: Modify trust attributes of Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA -t TC,TC,TC -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw
cert.sh: #227: Modify trust attributes of Root CA -t TC,TC,TC - PASSED
cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA-dsa -t TC,TC,TC -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw
cert.sh: #228: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED
cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA-ec -t TC,TC,TC -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -f ../tests.pw
cert.sh: #229: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED
cert.sh SUCCESS: SSL passed
cert.sh: Creating database for OCSP stapling tests  ===============
cp -r /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/stapling
Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA
pk12util: PKCS12 EXPORT SUCCESSFUL
Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling
pk12util: PKCS12 IMPORT SUCCESSFUL
cert.sh: Creating Client CA Issued Certificates ==============
cert.sh: Initializing Alice's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/alicedir -f ../tests.pw
cert.sh: #230: Initializing Alice's Cert DB - PASSED
cert.sh: Loading root cert module to Alice's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/alicedir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #231: Loading root cert module to Alice's Cert DB - PASSED
cert.sh: Import Root CA for Alice --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/alicedir -i ../CA/TestCA.ca.cert
cert.sh: #232: Import Root CA for Alice - PASSED
cert.sh: Import DSA Root CA for Alice --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/alicedir -i ../CA/TestCA-dsa.ca.cert
cert.sh: #233: Import DSA Root CA for Alice - PASSED
cert.sh: Import EC Root CA for Alice --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/alicedir -i ../CA/TestCA-ec.ca.cert
cert.sh: #234: Import EC Root CA for Alice - PASSED
cert.sh: Generate Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #235: Generate Cert Request for Alice - PASSED
cert.sh: Sign Alice's Request --------------------------
certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw 
cert.sh: #236: Sign Alice's Request - PASSED
cert.sh: Import Alice's Cert --------------------------
certutil -A -n Alice -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/alicedir -f ../tests.pw -i Alice.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #237: Import Alice's Cert - PASSED
cert.sh SUCCESS: Alice's Cert Created
cert.sh: Generate DSA Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #238: Generate DSA Cert Request for Alice - PASSED
cert.sh: Sign Alice's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw 
cert.sh: #239: Sign Alice's DSA Request - PASSED
cert.sh: Import Alice's DSA Cert --------------------------
certutil -A -n Alice-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/alicedir -f ../tests.pw -i Alice-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #240: Import Alice's DSA Cert - PASSED
cert.sh SUCCESS: Alice's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #241: Generate mixed DSA Cert Request for Alice - PASSED
cert.sh: Sign Alice's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw 
cert.sh: #242: Sign Alice's DSA Request with RSA - PASSED
cert.sh: Import Alice's mixed DSA Cert --------------------------
certutil -A -n Alice-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/alicedir -f ../tests.pw -i Alice-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #243: Import Alice's mixed DSA Cert - PASSED
cert.sh SUCCESS: Alice's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #244: Generate EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request --------------------------
certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw 
cert.sh: #245: Sign Alice's EC Request - PASSED
cert.sh: Import Alice's EC Cert --------------------------
certutil -A -n Alice-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/alicedir -f ../tests.pw -i Alice-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #246: Import Alice's EC Cert - PASSED
cert.sh SUCCESS: Alice's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #247: Generate mixed EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw 
cert.sh: #248: Sign Alice's EC Request with RSA - PASSED
cert.sh: Import Alice's mixed EC Cert --------------------------
certutil -A -n Alice-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #249: Import Alice's mixed EC Cert - PASSED
cert.sh SUCCESS: Alice's mixed EC Cert Created
cert.sh: Initializing Bob's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/bobdir -f ../tests.pw
cert.sh: #250: Initializing Bob's Cert DB - PASSED
cert.sh: Loading root cert module to Bob's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/bobdir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #251: Loading root cert module to Bob's Cert DB - PASSED
cert.sh: Import Root CA for Bob --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/bobdir -i ../CA/TestCA.ca.cert
cert.sh: #252: Import Root CA for Bob - PASSED
cert.sh: Import DSA Root CA for Bob --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/bobdir -i ../CA/TestCA-dsa.ca.cert
cert.sh: #253: Import DSA Root CA for Bob - PASSED
cert.sh: Import EC Root CA for Bob --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/bobdir -i ../CA/TestCA-ec.ca.cert
cert.sh: #254: Import EC Root CA for Bob - PASSED
cert.sh: Generate Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #255: Generate Cert Request for Bob - PASSED
cert.sh: Sign Bob's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw 
cert.sh: #256: Sign Bob's Request - PASSED
cert.sh: Import Bob's Cert --------------------------
certutil -A -n Bob -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/bobdir -f ../tests.pw -i Bob.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #257: Import Bob's Cert - PASSED
cert.sh SUCCESS: Bob's Cert Created
cert.sh: Generate DSA Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #258: Generate DSA Cert Request for Bob - PASSED
cert.sh: Sign Bob's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw 
cert.sh: #259: Sign Bob's DSA Request - PASSED
cert.sh: Import Bob's DSA Cert --------------------------
certutil -A -n Bob-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/bobdir -f ../tests.pw -i Bob-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #260: Import Bob's DSA Cert - PASSED
cert.sh SUCCESS: Bob's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #261: Generate mixed DSA Cert Request for Bob - PASSED
cert.sh: Sign Bob's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw 
cert.sh: #262: Sign Bob's DSA Request with RSA - PASSED
cert.sh: Import Bob's mixed DSA Cert --------------------------
certutil -A -n Bob-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/bobdir -f ../tests.pw -i Bob-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #263: Import Bob's mixed DSA Cert - PASSED
cert.sh SUCCESS: Bob's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #264: Generate EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw 
cert.sh: #265: Sign Bob's EC Request - PASSED
cert.sh: Import Bob's EC Cert --------------------------
certutil -A -n Bob-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/bobdir -f ../tests.pw -i Bob-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #266: Import Bob's EC Cert - PASSED
cert.sh SUCCESS: Bob's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #267: Generate mixed EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw 
cert.sh: #268: Sign Bob's EC Request with RSA - PASSED
cert.sh: Import Bob's mixed EC Cert --------------------------
certutil -A -n Bob-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #269: Import Bob's mixed EC Cert - PASSED
cert.sh SUCCESS: Bob's mixed EC Cert Created
cert.sh: Creating Dave's Certificate -------------------------
cert.sh: Initializing Dave's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dave -f ../tests.pw
cert.sh: #270: Initializing Dave's Cert DB - PASSED
cert.sh: Loading root cert module to Dave's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dave

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #271: Loading root cert module to Dave's Cert DB - PASSED
cert.sh: Import Root CA for Dave --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dave -i ../CA/TestCA.ca.cert
cert.sh: #272: Import Root CA for Dave - PASSED
cert.sh: Import DSA Root CA for Dave --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dave -i ../CA/TestCA-dsa.ca.cert
cert.sh: #273: Import DSA Root CA for Dave - PASSED
cert.sh: Import EC Root CA for Dave --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dave -i ../CA/TestCA-ec.ca.cert
cert.sh: #274: Import EC Root CA for Dave - PASSED
cert.sh: Generate Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #275: Generate Cert Request for Dave - PASSED
cert.sh: Sign Dave's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw 
cert.sh: #276: Sign Dave's Request - PASSED
cert.sh: Import Dave's Cert --------------------------
certutil -A -n Dave -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dave -f ../tests.pw -i Dave.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #277: Import Dave's Cert - PASSED
cert.sh SUCCESS: Dave's Cert Created
cert.sh: Generate DSA Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #278: Generate DSA Cert Request for Dave - PASSED
cert.sh: Sign Dave's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw 
cert.sh: #279: Sign Dave's DSA Request - PASSED
cert.sh: Import Dave's DSA Cert --------------------------
certutil -A -n Dave-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dave -f ../tests.pw -i Dave-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #280: Import Dave's DSA Cert - PASSED
cert.sh SUCCESS: Dave's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #281: Generate mixed DSA Cert Request for Dave - PASSED
cert.sh: Sign Dave's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw 
cert.sh: #282: Sign Dave's DSA Request with RSA - PASSED
cert.sh: Import Dave's mixed DSA Cert --------------------------
certutil -A -n Dave-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dave -f ../tests.pw -i Dave-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #283: Import Dave's mixed DSA Cert - PASSED
cert.sh SUCCESS: Dave's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #284: Generate EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw 
cert.sh: #285: Sign Dave's EC Request - PASSED
cert.sh: Import Dave's EC Cert --------------------------
certutil -A -n Dave-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dave -f ../tests.pw -i Dave-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #286: Import Dave's EC Cert - PASSED
cert.sh SUCCESS: Dave's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #287: Generate mixed EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw 
cert.sh: #288: Sign Dave's EC Request with RSA - PASSED
cert.sh: Import Dave's mixed EC Cert --------------------------
certutil -A -n Dave-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dave -f ../tests.pw -i Dave-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #289: Import Dave's mixed EC Cert - PASSED
cert.sh SUCCESS: Dave's mixed EC Cert Created
cert.sh: Creating multiEmail's Certificate --------------------
cert.sh: Initializing Eve's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eve -f ../tests.pw
cert.sh: #290: Initializing Eve's Cert DB - PASSED
cert.sh: Loading root cert module to Eve's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eve

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #291: Loading root cert module to Eve's Cert DB - PASSED
cert.sh: Import Root CA for Eve --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eve -i ../CA/TestCA.ca.cert
cert.sh: #292: Import Root CA for Eve - PASSED
cert.sh: Import DSA Root CA for Eve --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eve -i ../CA/TestCA-dsa.ca.cert
cert.sh: #293: Import DSA Root CA for Eve - PASSED
cert.sh: Import EC Root CA for Eve --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eve -i ../CA/TestCA-ec.ca.cert
cert.sh: #294: Import EC Root CA for Eve - PASSED
cert.sh: Generate Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #295: Generate Cert Request for Eve - PASSED
cert.sh: Sign Eve's Request --------------------------
certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #296: Sign Eve's Request - PASSED
cert.sh: Import Eve's Cert --------------------------
certutil -A -n Eve -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eve -f ../tests.pw -i Eve.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #297: Import Eve's Cert - PASSED
cert.sh SUCCESS: Eve's Cert Created
cert.sh: Generate DSA Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #298: Generate DSA Cert Request for Eve - PASSED
cert.sh: Sign Eve's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #299: Sign Eve's DSA Request - PASSED
cert.sh: Import Eve's DSA Cert --------------------------
certutil -A -n Eve-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eve -f ../tests.pw -i Eve-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #300: Import Eve's DSA Cert - PASSED
cert.sh SUCCESS: Eve's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #301: Generate mixed DSA Cert Request for Eve - PASSED
cert.sh: Sign Eve's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #302: Sign Eve's DSA Request with RSA - PASSED
cert.sh: Import Eve's mixed DSA Cert --------------------------
certutil -A -n Eve-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eve -f ../tests.pw -i Eve-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #303: Import Eve's mixed DSA Cert - PASSED
cert.sh SUCCESS: Eve's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #304: Generate EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request --------------------------
certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #305: Sign Eve's EC Request - PASSED
cert.sh: Import Eve's EC Cert --------------------------
certutil -A -n Eve-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eve -f ../tests.pw -i Eve-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #306: Import Eve's EC Cert - PASSED
cert.sh SUCCESS: Eve's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #307: Generate mixed EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #308: Sign Eve's EC Request with RSA - PASSED
cert.sh: Import Eve's mixed EC Cert --------------------------
certutil -A -n Eve-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eve -f ../tests.pw -i Eve-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #309: Import Eve's mixed EC Cert - PASSED
cert.sh SUCCESS: Eve's mixed EC Cert Created
cert.sh: Importing Certificates ==============================
cert.sh: Import Bob's cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert
cert.sh: #310: Import Bob's cert into Alice's db - PASSED
cert.sh: Import Dave's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #311: Import Dave's cert into Alice's DB - PASSED
cert.sh: Import Dave's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #312: Import Dave's cert into Bob's DB - PASSED
cert.sh: Import Eve's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #313: Import Eve's cert into Alice's DB - PASSED
cert.sh: Import Eve's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #314: Import Eve's cert into Bob's DB - PASSED
cert.sh: Importing EC Certificates ==============================
cert.sh: Import Bob's EC cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert
cert.sh: #315: Import Bob's EC cert into Alice's db - PASSED
cert.sh: Import Dave's EC cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #316: Import Dave's EC cert into Alice's DB - PASSED
cert.sh: Import Dave's EC cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #317: Import Dave's EC cert into Bob's DB - PASSED
cert.sh SUCCESS: SMIME passed
cert.sh: Creating FIPS 140 DSA Certificates ==============
cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips -f ../tests.fipspw
cert.sh: #318: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED
cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #319: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED
cert.sh: Enable FIPS mode on database -----------------------
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips -fips true 

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
FIPS mode enabled.
cert.sh: #320: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED
cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate --------------------------
certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise


Generating key.  This may take a few moments...

Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #321: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED
cert.sh SUCCESS: FIPS passed
cert.sh: Creating Server CA Issued Certificate for 
             EC Curves Test Certificates ------------------------------------
cert.sh: Initializing EC Curve's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eccurves -f ../tests.pw
cert.sh: #322: Initializing EC Curve's Cert DB - PASSED
cert.sh: Loading root cert module to EC Curve's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eccurves

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #323: Loading root cert module to EC Curve's Cert DB - PASSED
cert.sh: Import EC Root CA for EC Curves Test Certificates --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eccurves -i ../CA/TestCA-ec.ca.cert
cert.sh: #324: Import EC Root CA for EC Curves Test Certificates - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp256 --------------------------
certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #325: Generate EC Cert Request for Curve-nistp256 - PASSED
cert.sh: Sign Curve-nistp256's EC Request --------------------------
certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw 
cert.sh: #326: Sign Curve-nistp256's EC Request - PASSED
cert.sh: Import Curve-nistp256's EC Cert --------------------------
certutil -A -n Curve-nistp256-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #327: Import Curve-nistp256's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp384 --------------------------
certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #328: Generate EC Cert Request for Curve-nistp384 - PASSED
cert.sh: Sign Curve-nistp384's EC Request --------------------------
certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw 
cert.sh: #329: Sign Curve-nistp384's EC Request - PASSED
cert.sh: Import Curve-nistp384's EC Cert --------------------------
certutil -A -n Curve-nistp384-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #330: Import Curve-nistp384's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp521 --------------------------
certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #331: Generate EC Cert Request for Curve-nistp521 - PASSED
cert.sh: Sign Curve-nistp521's EC Request --------------------------
certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw 
cert.sh: #332: Sign Curve-nistp521's EC Request - PASSED
cert.sh: Import Curve-nistp521's EC Cert --------------------------
certutil -A -n Curve-nistp521-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #333: Import Curve-nistp521's EC Cert - PASSED
cert.sh: Initializing TestExt's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw
cert.sh: #334: Initializing TestExt's Cert DB - PASSED
cert.sh: Loading root cert module to TestExt's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #335: Loading root cert module to TestExt's Cert DB - PASSED
cert.sh: Import Root CA for TestExt --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -i ../CA/TestCA.ca.cert
cert.sh: #336: Import Root CA for TestExt - PASSED
cert.sh: Import DSA Root CA for TestExt --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -i ../CA/TestCA-dsa.ca.cert
cert.sh: #337: Import DSA Root CA for TestExt - PASSED
cert.sh: Import EC Root CA for TestExt --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -i ../CA/TestCA-ec.ca.cert
cert.sh: #338: Import EC Root CA for TestExt - PASSED
cert.sh: Generate Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #339: Generate Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's Request --------------------------
certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw 
cert.sh: #340: Sign TestExt's Request - PASSED
cert.sh: Import TestExt's Cert --------------------------
certutil -A -n TestExt -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -i TestExt.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #341: Import TestExt's Cert - PASSED
cert.sh SUCCESS: TestExt's Cert Created
cert.sh: Generate DSA Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #342: Generate DSA Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw 
cert.sh: #343: Sign TestExt's DSA Request - PASSED
cert.sh: Import TestExt's DSA Cert --------------------------
certutil -A -n TestExt-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -i TestExt-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #344: Import TestExt's DSA Cert - PASSED
cert.sh SUCCESS: TestExt's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #345: Generate mixed DSA Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw 
cert.sh: #346: Sign TestExt's DSA Request with RSA - PASSED
cert.sh: Import TestExt's mixed DSA Cert --------------------------
certutil -A -n TestExt-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #347: Import TestExt's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestExt's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #348: Generate EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request --------------------------
certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw 
cert.sh: #349: Sign TestExt's EC Request - PASSED
cert.sh: Import TestExt's EC Cert --------------------------
certutil -A -n TestExt-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #350: Import TestExt's EC Cert - PASSED
cert.sh SUCCESS: TestExt's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #351: Generate mixed EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw 
cert.sh: #352: Sign TestExt's EC Request with RSA - PASSED
cert.sh: Import TestExt's mixed EC Cert --------------------------
certutil -A -n TestExt-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #353: Import TestExt's mixed EC Cert - PASSED
cert.sh SUCCESS: TestExt's mixed EC Cert Created

certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt1 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt1
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a9:fc:6f:cb
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Fri May 19 17:03:19 2017
            Not After : Sat Aug 19 17:03:19 2017
        Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:ee:fb:1b:a5:e2:27:56:13:29:a5:99:bb:b5:01:da:
                    63:bb:e8:78:6a:f3:ee:87:f2:4a:78:e1:4a:47:6e:6d:
                    f8:19:ff:37:e3:0c:35:7f:a4:ed:e6:27:58:19:21:d3:
                    d0:0f:ab:fc:33:97:0c:68:9f:69:d0:cc:2d:7e:02:65:
                    37:da:d5:36:76:69:1a:48:d2:35:e7:91:dd:be:e6:8d:
                    65:38:d3:eb:d4:38:3a:f4:94:6b:be:90:69:4e:e3:ee:
                    ee:22:16:b0:d6:3a:c3:69:e4:f4:03:95:19:a3:62:81:
                    8e:d2:af:fc:9f:39:11:80:2a:ce:d1:38:04:d8:0c:2e:
                    79:bb:35:c2:d7:eb:88:47:ec:5f:8b:96:56:44:23:67:
                    f8:14:d0:a9:da:c4:a6:35:5a:fd:c6:16:c6:a9:d5:43:
                    16:a3:6b:f7:1d:ab:dc:e8:ea:e6:6b:48:1d:f8:30:61:
                    fb:ad:07:4a:d5:e1:6a:b3:fb:73:25:2c:f4:a0:88:d1:
                    c9:0b:97:94:0a:44:da:fd:3d:90:70:1d:38:72:7d:b3:
                    c3:c1:6d:0f:ba:08:b8:4f:04:d7:66:9e:f1:a5:0b:6a:
                    14:f0:c3:20:54:7a:08:c4:27:b7:d9:ac:d1:91:f2:80:
                    d5:42:12:74:5b:da:05:61:fb:a8:7b:2e:2b:8a:99:1b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        94:1a:fa:b3:45:0b:bc:fb:6c:94:86:28:83:12:85:18:
        e6:48:67:1b:0a:ec:b0:42:33:41:c2:e1:22:df:40:9b:
        0b:2d:a3:7d:54:ef:51:e8:52:3f:4f:fa:58:dc:ef:6f:
        5e:31:00:d7:a0:ed:db:d6:0e:6b:0d:ab:d2:3c:00:b8:
        f2:71:1d:bb:6f:5a:99:f2:45:3c:11:b5:b1:33:66:08:
        30:65:e4:24:69:89:e5:e4:e6:a0:4f:4d:f3:ad:a4:2f:
        d9:b5:03:41:09:e7:23:d9:f5:8f:b6:39:f8:89:d9:44:
        aa:44:4b:d7:cf:74:cd:77:52:dc:37:99:a1:03:7e:a0:
        0e:97:05:5e:6a:38:63:0c:96:52:a1:b0:26:02:7f:7b:
        3e:29:85:ef:5c:4e:f7:c3:55:2f:35:73:28:a6:58:20:
        e5:f9:50:e8:53:63:56:62:cc:4e:6a:8e:58:79:8f:02:
        6f:82:64:50:36:05:55:2d:49:5d:e8:fc:a8:ed:66:01:
        7e:87:e0:11:0b:c7:aa:dc:24:ea:65:73:30:94:24:e3:
        6f:18:9f:4c:fd:a0:0c:6e:ce:b2:e5:5a:61:a6:33:4e:
        19:05:9d:b4:95:a1:bc:08:90:0a:ed:a5:c7:de:87:c0:
        c8:b0:26:51:f2:9c:dd:d8:4d:10:c4:e4:5e:1b:a0:09
    Fingerprint (SHA-256):
        91:ED:92:55:6F:7F:DD:2B:41:56:C1:5B:21:01:61:10:9D:A3:27:14:3C:72:E8:06:BF:66:07:A1:B4:57:EB:FD
    Fingerprint (SHA1):
        97:6F:07:B7:73:07:72:A4:B6:23:84:12:27:82:45:7D:CC:AF:CA:0A

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #354: Certificate Key Usage Extension (1) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt2 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt2
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a9:fc:6f:f2
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Fri May 19 17:03:29 2017
            Not After : Sat Aug 19 17:03:29 2017
        Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:66:eb:72:2f:42:4f:18:ea:3f:48:4e:a0:82:ee:1a:
                    4b:36:6d:8a:5e:86:57:6d:68:a0:6a:d7:41:32:67:0f:
                    64:2b:39:d9:ad:02:49:52:35:3a:81:65:7e:8b:5d:47:
                    cb:28:8a:ef:ad:0b:a6:bc:2d:bb:8d:11:19:c5:0c:2e:
                    c4:6f:3d:07:3f:c2:9e:a6:cd:8d:20:61:8e:ac:3f:0f:
                    b0:3a:ed:8f:ac:4f:94:38:5f:b4:d5:1b:0d:93:f1:7f:
                    7e:af:5e:3f:4f:2a:4a:1d:3a:74:7b:77:bb:6a:40:b5:
                    49:72:da:45:36:d0:b8:30:75:2d:fc:db:55:26:a7:e0:
                    9f:af:a0:00:8b:91:84:84:32:f8:47:5e:1b:5d:7f:f1:
                    ae:1c:91:bb:7b:36:ce:2c:3b:61:57:41:a6:30:95:6f:
                    b1:52:e0:33:c9:14:7d:07:78:da:c9:26:f2:e2:5d:91:
                    37:64:77:0a:28:91:90:aa:23:47:38:93:74:51:ae:7d:
                    b0:fc:78:e0:0c:25:9a:f6:4b:d6:2c:e3:12:bd:56:4a:
                    71:2d:c1:fc:ac:1d:4a:dc:92:95:b3:5b:f8:84:4b:da:
                    16:d0:e0:d9:ef:e7:49:7b:75:55:6f:ad:60:17:c5:83:
                    6c:2d:d1:19:56:b9:ea:d3:f6:a2:30:f0:72:8b:15:cb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Critical: True
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        0f:c0:cf:07:d1:4b:0a:0b:6b:a6:82:84:71:9b:75:d6:
        77:5e:6f:6b:c5:d5:c8:4e:6a:d9:9a:4d:17:53:20:3e:
        c4:b8:c6:09:dd:61:46:c7:d5:ba:1a:72:70:44:8a:71:
        56:a5:a6:3d:6a:ff:c8:7a:39:2f:00:e7:44:8e:64:aa:
        47:74:fc:fb:17:b7:bd:ce:3a:34:34:5c:2a:02:04:38:
        6b:4e:6e:04:b0:71:7c:e0:33:75:d0:af:d3:1e:7d:10:
        03:c4:01:0d:0a:47:f2:aa:f3:8d:38:26:81:6e:cf:40:
        a5:89:3a:1a:ed:0e:1f:3d:8c:df:c9:83:ba:2b:5b:8f:
        cd:72:9b:07:16:12:26:13:3f:77:65:14:63:a0:9c:81:
        80:29:75:7f:af:6a:35:63:37:f3:8a:e5:b8:44:da:eb:
        ed:88:6f:9b:33:d1:8a:5d:5d:4c:43:45:c6:5b:77:a4:
        08:43:0e:15:04:47:45:d3:c4:2c:82:f2:23:3c:7e:cc:
        31:28:55:24:78:0f:52:d5:fc:4d:f8:28:4b:7b:53:0a:
        d2:64:ba:d7:da:68:52:e9:2d:2a:90:65:3a:8d:2c:cf:
        59:d3:5e:09:85:72:27:1e:2d:05:49:03:3b:ed:aa:f7:
        2e:e4:07:62:9e:da:86:3e:ee:50:db:87:9d:2f:3d:26
    Fingerprint (SHA-256):
        DB:DD:6A:0B:AF:11:1F:34:D0:6E:1A:51:84:67:6C:49:9B:A3:60:B1:0E:B3:DB:1D:D5:3F:FD:C4:EA:85:BF:9E
    Fingerprint (SHA1):
        10:88:06:61:A7:38:46:9A:E4:F8:0E:16:DB:9A:C3:F0:F2:E7:B7:17

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #355: Certificate Key Usage Extension (2) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt3 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
y
-1
n


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt3
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a9:fc:70:04
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Fri May 19 17:03:59 2017
            Not After : Sat Aug 19 17:03:59 2017
        Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a0:db:08:13:ca:ea:43:3b:92:b6:77:0e:a7:a1:a2:cc:
                    fa:5e:56:52:d0:cb:b4:b9:82:5c:af:d9:eb:36:d7:cb:
                    5e:d8:fb:ec:31:4c:a9:35:aa:63:a6:c6:cb:97:4f:02:
                    af:f7:67:d8:54:1a:97:a0:e1:be:c6:94:04:a5:26:86:
                    de:ba:bc:01:bf:f3:04:77:26:50:55:e7:2f:37:3b:29:
                    ae:91:40:44:70:f6:96:af:30:6c:32:3e:89:a2:60:ee:
                    aa:dd:c4:eb:85:26:41:61:b8:a2:24:f9:b2:76:7b:8d:
                    dc:ed:47:22:29:6e:82:59:38:8d:7f:dd:62:3a:a1:79:
                    61:e5:dd:6c:97:13:84:c5:98:b9:60:2f:07:09:28:a4:
                    35:32:a0:95:d2:63:89:9c:f6:94:c6:db:64:e5:6e:1d:
                    bf:e4:ea:1b:eb:90:c6:0b:ca:39:9c:35:de:6f:e0:c5:
                    5f:1c:bd:e0:b1:37:2c:1f:f1:28:1b:96:dd:7e:92:99:
                    42:87:22:23:16:a8:3b:a2:54:ea:61:16:fe:87:f3:ca:
                    4f:1c:82:44:43:c1:b3:e4:7a:5e:cf:1b:5a:83:73:30:
                    37:57:e9:94:60:77:2c:a0:7c:79:83:39:81:d7:04:d0:
                    ad:aa:d4:2a:78:8d:94:c4:89:72:c8:3c:0c:9a:85:cd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        63:77:63:b0:d6:a6:80:04:27:2b:21:b6:44:dd:29:de:
        0a:02:4f:18:d2:43:95:de:e4:44:76:ee:d2:f4:ca:be:
        43:7a:03:c1:a4:08:8b:c8:72:58:13:8c:fd:d7:f8:f9:
        46:38:8f:43:fb:0d:06:e3:3f:04:26:f8:ca:d0:5c:c4:
        2d:f1:07:b2:eb:aa:53:29:ab:90:8b:e9:ae:b2:60:6a:
        78:b5:9e:27:d7:ba:6d:74:c5:b7:13:ba:22:54:8d:37:
        b5:db:a3:3b:3b:8c:ac:89:11:87:0a:a7:6f:c9:66:f5:
        f6:8c:a3:61:b4:22:4c:58:05:54:44:04:b0:fc:cd:6d:
        b9:f0:01:cb:57:0e:87:03:d4:ea:45:e3:d2:4f:de:dd:
        5e:c7:76:de:43:28:ab:ef:44:ea:34:53:99:08:c5:69:
        c0:b6:a2:59:7d:10:ad:12:79:71:ec:51:13:99:d2:8a:
        68:59:e7:38:37:7b:82:48:62:04:52:c9:56:c9:d2:f4:
        f1:b1:23:d3:3f:04:f2:f8:09:26:6f:6d:93:e6:32:f7:
        53:bc:7e:df:ec:08:cb:37:47:a5:7a:e1:49:86:22:b9:
        14:f9:12:12:47:84:19:78:2e:8a:43:31:91:de:ec:06:
        52:13:90:f0:ec:54:5a:c5:ec:2d:35:1f:a3:70:1f:c7
    Fingerprint (SHA-256):
        87:62:3A:DA:C8:99:1A:58:21:4F:03:DD:0E:B7:D4:ED:86:8D:37:FA:36:26:E8:BC:1C:04:16:C0:54:F3:EC:19
    Fingerprint (SHA1):
        5C:74:59:83:F1:6D:F7:2B:3C:23:F2:58:A6:8A:1F:7F:17:A9:C5:CE

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #356: Certificate Basic Constraints Extension (3) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt4 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
n
-1
y


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt4
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a9:fc:70:3f
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Fri May 19 17:04:15 2017
            Not After : Sat Aug 19 17:04:15 2017
        Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:d9:15:af:4e:d4:bd:c3:01:0d:6a:65:68:ce:e0:42:
                    fb:5a:85:f7:dc:fd:0f:3c:5f:55:db:37:4b:92:30:0d:
                    48:a1:d0:b6:4a:6d:d0:47:74:fe:12:0f:9f:8f:7a:8e:
                    da:c0:f4:e1:51:75:22:12:12:1c:c7:0e:d8:75:d9:31:
                    2e:44:fb:01:dc:0c:6b:5a:cc:ce:5e:a7:7c:40:47:2d:
                    1a:d0:5f:fd:7d:56:c6:67:2e:c5:67:ef:c1:e1:33:f6:
                    d7:03:94:d2:72:91:33:82:f9:09:9e:dc:ac:5e:61:cf:
                    d8:75:ab:3e:9b:4a:68:d7:7a:33:2a:4b:07:24:8c:8f:
                    bf:5d:3b:bd:e1:5e:7b:28:d5:79:16:b4:ce:a0:c8:eb:
                    4a:94:96:2d:13:c7:3d:5f:26:1d:6c:2e:65:f9:04:96:
                    74:ab:cc:4e:8b:fb:8d:5b:66:b8:66:b2:2b:9e:68:2c:
                    b2:d5:0c:ed:03:e9:b6:8a:b2:dd:2c:e5:41:fa:ae:5a:
                    2d:80:27:17:2e:06:99:fe:88:97:13:e0:70:4d:81:c3:
                    89:bb:b6:ae:2b:dc:b0:58:dd:1f:ba:f7:5c:a4:49:27:
                    fb:a4:0a:70:2c:bb:8c:f7:13:58:a1:5c:c9:c1:ea:71:
                    5d:ce:07:7d:d1:df:23:83:31:7b:be:f1:a1:6b:68:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is not a CA.

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        48:35:2d:78:b6:3f:b4:c9:1a:56:49:b6:90:1d:64:d5:
        25:4c:f5:ec:d8:30:77:1e:e7:ce:d4:7f:b3:df:81:da:
        57:4d:b6:3a:df:a1:ae:b5:89:06:fc:d2:05:39:19:39:
        70:d4:8d:3d:cc:cb:fc:c2:89:32:15:3d:37:a4:4a:91:
        82:df:f5:64:c0:70:7e:c1:2a:3a:ee:c0:01:36:49:0c:
        d8:9b:7f:3c:8e:6d:69:74:bf:14:50:49:40:93:9c:03:
        0a:e5:8c:69:fc:d7:f7:b8:58:c8:c1:5b:1a:65:ad:e6:
        98:9b:e3:8f:7e:fb:01:d5:35:d4:d8:ee:26:b3:2b:46:
        42:9d:78:4b:d1:41:a7:37:62:d1:94:3e:97:2c:9c:f9:
        5a:21:95:c0:ed:2c:59:3b:c9:cc:26:d9:bc:b4:c9:61:
        14:06:83:ee:c6:fc:64:1e:95:b7:73:83:a6:34:02:b8:
        5e:ff:aa:4d:51:5b:84:f5:4c:24:7f:cd:23:d2:59:f0:
        5a:64:b5:26:e6:ef:63:bb:2b:b2:92:70:a7:14:39:9c:
        a3:f9:6b:4a:75:73:77:3e:3f:53:38:7a:56:40:bf:82:
        eb:03:8b:15:2f:bd:97:d6:52:cc:8b:eb:88:42:2d:17:
        5a:de:e5:36:68:c4:e8:e5:b1:7d:63:1b:71:b1:85:55
    Fingerprint (SHA-256):
        78:72:8A:A4:0D:B9:12:59:C0:8F:EE:B9:88:9E:6C:F6:B9:E4:E1:FF:E1:CF:B3:CE:8F:12:FF:75:34:F5:A6:B1
    Fingerprint (SHA1):
        C8:1B:E3:FB:87:36:7C:29:25:5C:E3:9A:12:A9:0D:AD:7F:DE:8A:F1

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #357: Certificate Basic Constraints Extension (4) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt5 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
y
12341235123


y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Notice: Trust flag u is set automatically if the private key is present.
Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt5
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a9:fc:70:5c
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Fri May 19 17:04:22 2017
            Not After : Sat Aug 19 17:04:22 2017
        Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e2:60:5a:c6:52:29:dc:f4:20:4c:01:0b:74:85:d1:c8:
                    0c:8a:83:50:13:53:cf:73:04:1c:a3:18:7d:7d:30:9b:
                    75:c3:29:af:dc:5d:98:e5:bb:9b:08:48:42:65:04:bf:
                    aa:66:9f:8b:25:7b:e5:b5:74:f5:8b:22:81:c7:a6:72:
                    1f:42:6a:20:14:9b:4c:31:63:fe:34:73:ad:a2:72:3d:
                    ac:c0:d2:22:c8:bb:d6:94:c3:00:80:79:9b:58:07:c4:
                    55:fe:e2:5d:8d:b7:de:0e:66:83:f4:87:4a:73:0b:2b:
                    54:c5:34:f5:87:ef:93:42:fc:42:53:7b:bd:b1:20:1f:
                    9e:cc:97:61:f5:be:65:0b:39:7d:8e:76:6c:0d:9a:27:
                    c3:ce:d9:3b:b5:bf:66:d1:a9:a4:20:ae:7a:d2:7e:fa:
                    4d:7c:f8:f4:3f:80:42:5c:54:d0:21:fa:7e:f6:04:63:
                    b8:ac:39:e3:10:cc:d5:a1:80:bc:0b:00:76:5e:1c:7f:
                    5b:04:d3:2f:42:d5:be:c5:f7:69:b3:46:01:84:3c:10:
                    4c:00:c1:0b:f0:ee:0d:32:41:95:05:05:c0:65:2b:06:
                    e2:21:7c:3a:93:56:d3:87:50:ee:a2:ee:ce:4e:48:a9:
                    dd:af:01:16:7c:54:d5:ae:50:fc:99:b6:53:37:cf:03
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Key ID:
                12341235123

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        17:b1:85:4e:53:f2:60:98:5b:52:44:d6:7d:69:5a:49:
        1b:37:56:17:88:82:99:f2:2b:40:37:c2:b3:e9:11:ee:
        86:98:29:b1:7b:26:db:1c:d1:2c:fb:18:0e:52:ea:19:
        a2:0f:e5:d8:99:80:49:e0:2b:54:ec:9c:4e:85:13:4c:
        6a:b2:2a:1f:57:2b:9e:3a:23:76:87:43:5b:7a:05:4a:
        f5:db:55:1d:7e:ec:0a:12:13:eb:a9:c8:b6:06:98:bc:
        90:28:b1:62:f8:95:1d:9e:5e:c5:e4:3f:13:84:eb:2d:
        fc:5c:1e:8b:6e:a2:5b:3a:b8:e5:16:89:9d:d0:0d:a4:
        40:aa:8b:04:1b:ee:f5:f5:4a:13:a9:53:bd:49:15:92:
        3b:1f:a8:5d:86:a6:fb:f4:ef:8e:3a:29:f7:17:68:99:
        6e:78:22:9c:10:8d:2b:3d:b1:7a:7f:44:91:4b:de:6c:
        f6:d4:5f:12:2c:9f:75:dd:09:7f:4a:2d:da:28:91:25:
        6c:5d:ab:c5:cf:4c:6a:1e:7c:32:2c:40:e6:ec:04:2d:
        06:a7:25:78:d0:e8:3e:16:97:03:db:3b:77:ab:02:54:
        71:23:1a:60:87:f9:a0:8c:b5:cc:99:e9:de:ad:39:3e:
        20:75:d7:83:10:fa:78:33:47:9f:b0:29:e0:d0:27:79
    Fingerprint (SHA-256):
        22:B7:DA:A0:92:7F:2A:1E:AF:EA:52:95:07:3F:FC:65:BB:8C:55:CB:62:4B:CC:F6:69:D9:17:8A:64:7B:95:A6
    Fingerprint (SHA1):
        0D:1D:52:FC:0E:64:0F:F9:3D:F5:CF:63:2A:B4:9D:49:9F:E8:7E:A9

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #358: Certificate Authority Key Identifier Extension (5) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt6 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
y

3
test.com

214123
y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Notice: Trust flag u is set automatically if the private key is present.
Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt6
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a9:fc:70:6a
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Fri May 19 17:04:33 2017
            Not After : Sat Aug 19 17:04:33 2017
        Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a9:36:07:95:e2:5a:3f:d0:61:44:18:68:59:76:b3:d7:
                    6d:31:c7:d6:4c:4e:cc:ba:4b:a0:ce:b4:c9:ce:db:c6:
                    40:86:bb:8e:9d:c4:f7:82:be:36:29:82:8f:ff:60:1c:
                    3b:fd:75:f5:01:74:19:d8:f0:f4:6a:e1:1d:ed:d0:b9:
                    97:e5:3f:5f:c8:85:df:7b:35:47:1c:35:a1:20:5c:c2:
                    2e:c1:ce:76:69:de:a6:6b:2d:f7:c7:24:c1:80:d3:ac:
                    eb:2c:51:40:27:7a:c5:e2:7f:06:b6:a7:c5:47:53:6b:
                    d0:12:e3:38:d5:be:22:59:a5:da:d7:68:74:92:a0:cc:
                    bc:e4:7f:cb:64:08:e7:a7:36:17:4f:a1:99:6a:4c:90:
                    ed:9e:d9:1e:37:48:c0:40:74:28:28:1f:5b:06:da:0b:
                    c4:fc:bf:86:be:b1:02:54:11:8d:7f:37:24:6f:03:38:
                    b7:d3:13:ff:aa:0b:02:a5:ff:ca:88:55:4e:5e:01:1c:
                    26:b2:25:df:14:c3:3e:ea:99:38:29:a2:2b:29:09:e3:
                    fb:76:8e:29:85:a8:a2:8c:33:54:83:f5:3e:5c:ec:c4:
                    64:65:d2:ff:92:f4:06:3d:30:0f:80:27:4b:e4:99:87:
                    44:0f:02:69:27:40:51:bb:63:ff:fb:bb:bc:80:f7:f1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Issuer: 
                DNS name: "test.com"
            Serial Number:
                214123

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        00:b9:fe:77:64:cf:54:45:8c:0a:87:3c:67:60:80:c5:
        81:b2:ad:23:ce:86:8e:98:c9:73:0c:d7:2d:e1:53:e5:
        40:df:92:73:44:87:06:47:30:67:13:ba:16:64:bf:10:
        53:84:c3:f6:39:ad:72:38:6b:83:70:a9:24:22:af:36:
        7a:da:a9:61:48:1b:01:c9:d6:7b:53:b7:e6:ed:65:48:
        2c:55:c7:51:e4:9a:ae:16:83:25:44:0d:fa:bc:8a:a2:
        50:4c:c4:ee:03:e0:12:4d:89:51:f8:fa:db:cf:61:d2:
        97:ba:bc:c7:d3:60:1d:cd:fc:9f:29:82:81:4a:1e:3b:
        ea:0e:ec:80:0d:36:3b:54:7f:86:d5:33:25:21:1c:36:
        15:b1:d8:76:b4:25:59:c9:9e:91:65:a2:a4:80:87:51:
        f5:d1:26:7c:91:c1:75:f4:a2:96:4d:44:79:22:82:5d:
        ef:72:68:09:78:64:d9:72:66:3e:cf:ab:df:ea:20:ff:
        93:99:02:65:8f:b4:5b:77:28:eb:1c:29:42:8c:65:17:
        05:d9:81:e8:69:74:43:61:d0:ac:de:c8:cd:19:d3:9a:
        eb:b5:8d:d1:5f:7e:e2:0b:c8:96:a6:5a:6e:20:6e:fd:
        5c:e2:34:fb:26:cc:04:74:56:fa:c2:fb:46:be:b2:b0
    Fingerprint (SHA-256):
        87:4C:AC:FA:97:E5:78:FF:F8:94:61:84:74:D2:5B:32:0D:B4:DC:F0:80:1A:21:E5:69:28:3C:6E:D7:D1:FC:7E
    Fingerprint (SHA1):
        8D:6C:D8:5F:F2:57:A7:2C:E7:B1:69:29:86:0A:5E:F3:72:AC:CA:DC

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #359: Certificate Authority Key Identifier Extension (6) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt7 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
1
2
rfc822@name.tld
3
test.com
8
1.2.3.4
9
OID.0.2.213
10
0
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Notice: Trust flag u is set automatically if the private key is present.
Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a9:fc:70:7f
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Fri May 19 17:04:48 2017
            Not After : Sat Aug 19 17:04:48 2017
        Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:c5:3e:35:d4:78:e4:3c:a8:8f:31:31:0b:29:87:f4:
                    57:98:47:4f:f0:e9:62:39:36:21:04:53:0b:e0:07:ee:
                    ef:75:f1:ad:25:31:a8:be:71:42:e8:6a:9e:12:57:04:
                    50:0a:17:92:8d:d9:15:84:93:cd:33:fb:96:57:05:c5:
                    b1:be:cc:47:8c:b2:c0:38:85:1f:5f:6e:81:8f:03:59:
                    2e:11:37:3f:90:81:3e:49:0e:b8:0e:b0:b5:00:a9:62:
                    1f:56:c6:0e:bc:10:a7:17:d5:ce:52:27:5b:2f:50:d7:
                    00:59:b4:78:8e:6f:3c:32:69:d8:9c:f1:f7:39:69:2e:
                    0a:13:d0:89:ac:94:5a:c1:cc:9f:36:f5:2b:b2:df:10:
                    1c:f8:b6:1a:f8:aa:be:5b:11:c1:cc:f7:74:ac:9b:ef:
                    22:20:6a:93:86:87:93:29:43:93:45:85:89:83:ea:92:
                    2d:a0:64:ab:63:1f:9e:28:a9:8d:32:95:eb:73:65:51:
                    08:dc:45:4a:74:7c:16:7f:15:17:bb:e3:cc:26:65:4b:
                    f7:b6:f0:1c:8a:28:3d:57:00:4c:ef:eb:5c:97:3b:0b:
                    f9:67:85:33:af:09:9c:75:46:0c:ac:32:2d:b6:3d:e8:
                    b6:89:68:54:8d:76:3c:06:d6:62:db:17:53:0d:a0:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RFC822 Name: "rfc822@name.tld"
                DNS name: "test.com"
                IP Address:
                    87:07:31:2e:32:2e:33:2e:34
                Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51
                Reasons:
                    80
                    (7 least significant bits unused)

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        7c:66:03:07:e5:4b:41:be:5a:58:b3:6d:cc:72:3e:f5:
        b7:86:74:e6:db:ab:96:a8:a6:f3:e8:fe:d9:7a:08:57:
        4f:ae:10:ae:e4:20:0c:5d:12:86:a4:9b:81:e3:a4:1b:
        be:8b:f2:d9:33:d1:26:7d:0a:23:c3:20:83:65:d4:8e:
        e9:00:58:d5:07:69:fa:bd:17:cf:b9:a2:f9:52:47:a3:
        2b:b5:9d:e3:1f:32:3d:33:7f:35:32:a8:ea:1d:64:e6:
        f0:1c:3b:4d:a9:d3:09:3b:91:62:9f:ec:e5:f3:e6:16:
        2f:16:84:f4:ce:ea:55:b4:ed:12:23:0b:b2:8b:a9:9f:
        b1:48:a1:8c:73:8b:5d:81:be:7a:af:e0:a2:6c:1d:82:
        7d:51:ee:e9:cc:63:63:2b:c1:af:ff:11:5b:1a:09:56:
        32:71:00:61:82:a9:dd:e7:9b:21:96:3a:62:78:ee:2c:
        b5:ef:5b:0f:fd:8d:7a:46:aa:41:4e:65:49:f4:8a:9d:
        9c:74:89:34:5f:f9:38:89:97:0d:34:8e:dd:60:8e:66:
        24:ba:1c:51:e0:57:e5:68:56:11:d3:a4:df:1e:8c:37:
        e0:24:ab:62:b1:5f:62:f9:d3:aa:66:74:32:72:c8:75:
        82:b1:8d:7e:54:f1:03:15:d0:2b:4c:22:26:95:f5:3e
    Fingerprint (SHA-256):
        20:6B:65:14:FB:31:2C:92:B5:E5:7D:73:44:CE:9B:F9:71:30:9C:2D:B9:59:7A:F2:D6:39:AD:2C:9B:34:C7:C3
    Fingerprint (SHA1):
        70:B6:01:4C:C5:A6:A4:2A:20:F1:54:41:05:BA:ED:F3:F1:3D:13:44

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #360: CRL Distribution Points Extension (7) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt8 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
2
SN=asdfsdf
4
3
test.com
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > Enter the relative name: 

Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Notice: Trust flag u is set automatically if the private key is present.
Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt8
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a9:fc:70:9d
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Fri May 19 17:05:15 2017
            Not After : Sat Aug 19 17:05:15 2017
        Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c0:be:41:28:71:18:aa:94:5b:e9:41:3b:e9:88:5a:de:
                    bf:e3:60:b0:b6:1e:67:db:6f:a9:39:8a:25:67:d3:f5:
                    e0:ff:bd:38:67:a4:dd:94:70:36:7c:aa:83:49:b9:ea:
                    58:9b:f3:cc:40:fe:e1:bd:24:81:9f:ee:e4:48:2e:a4:
                    58:19:da:4b:ff:48:52:77:dd:d7:17:81:02:4a:c6:cf:
                    36:f1:3e:94:37:7a:97:1e:fa:9a:7e:d4:86:90:87:f2:
                    48:fe:e2:09:ad:9e:c7:75:28:b6:de:1a:23:1a:96:f8:
                    70:1e:9b:12:9e:23:2a:49:02:e9:c0:d2:11:14:4f:08:
                    c5:ee:bc:92:1e:3a:70:3e:e1:40:8f:80:44:f0:b7:2d:
                    e1:0e:55:0f:5a:6d:36:59:66:87:cb:df:4a:74:23:29:
                    07:30:18:1c:6e:1a:9e:e4:3a:1d:2f:70:77:86:ce:3f:
                    f8:65:75:fb:66:ec:c8:dc:12:d8:92:8e:f7:e5:6d:ed:
                    d9:0a:91:cf:b4:82:dc:fa:5b:57:df:cf:5e:b5:6e:d0:
                    36:de:b4:89:4c:35:c3:4a:08:36:6c:99:66:b3:b4:a3:
                    2a:9c:ed:3e:c0:24:c5:ca:6b:7d:43:16:b0:1d:21:e5:
                    de:b1:6d:d8:23:f9:cb:30:59:48:d8:82:fe:80:44:5f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RDN: "SN=asdfsdf"
                Reasons:
                    08
                    (7 least significant bits unused)
                CRL issuer: 
                    DNS name: "test.com"

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        02:56:a8:5e:f2:81:9b:a4:53:54:c2:5c:b1:59:ad:0e:
        39:5d:a4:3b:43:d5:e9:e8:8d:3e:a3:f6:84:ce:cb:f9:
        97:ec:20:91:ba:38:bb:fa:f1:f7:ce:52:a6:69:b1:11:
        e0:f8:a5:2c:f6:8a:3d:86:d1:43:bc:9e:65:38:79:63:
        d2:08:fd:7e:7c:31:b6:f6:16:3d:2d:51:ae:9c:6b:d7:
        69:df:6f:b3:6a:38:d9:78:60:14:4b:ba:ef:9f:d6:ce:
        c8:e5:b7:5b:f1:5b:0b:41:27:5c:66:1d:81:8b:ae:d0:
        09:fa:6e:e2:cd:68:84:5b:31:7a:d0:a8:d8:99:6f:49:
        45:ec:ad:97:07:66:60:41:97:3e:03:d2:32:fa:3b:59:
        d2:88:d9:9e:f1:ba:b8:70:90:7f:42:a7:70:d5:63:7e:
        8c:01:19:76:57:e8:9c:25:4f:2e:a6:2d:4e:dc:5d:05:
        7d:b1:fb:d8:51:33:5c:55:48:a5:1e:36:0e:e1:13:3c:
        ff:06:15:7e:d0:19:de:8b:fa:90:59:c8:14:5a:1c:98:
        be:f0:d9:3d:59:e7:d2:55:0b:f2:f0:8c:c9:3a:e2:da:
        6c:87:ed:9d:24:5a:9f:74:3b:22:6e:d3:27:0a:a9:20:
        35:79:2a:c2:1a:f7:e2:ed:78:55:95:b2:6c:1b:73:f6
    Fingerprint (SHA-256):
        56:5D:17:65:CD:C4:CF:1F:DB:AC:9B:14:4B:8C:99:FE:C5:A1:A1:5B:AC:F0:A3:66:71:13:55:90:AA:27:D2:E0
    Fingerprint (SHA1):
        7C:6B:F3:B4:14:E5:2D:2B:12:66:2B:DA:41:14:9E:1B:C4:CD:DB:B5

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #361: CRL Distribution Points Extension (8) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt9 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
0
1
2
10
n


Generating key.  This may take a few moments...

		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt9
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a9:fc:70:cf
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Fri May 19 17:05:35 2017
            Not After : Sat Aug 19 17:05:35 2017
        Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:53:75:4e:dc:b3:eb:22:69:b7:0b:14:ea:fa:0a:49:
                    8d:2e:9e:8a:b9:c5:34:06:a4:a1:e7:0e:4f:7e:93:3e:
                    1e:3b:a3:24:91:87:9d:eb:30:a2:04:1c:e8:30:26:e4:
                    4f:36:a3:87:82:b5:58:6f:03:db:4b:9d:cc:6d:80:fc:
                    c2:21:5f:a8:d0:7e:0b:5c:e4:93:4b:4b:7e:2f:df:2f:
                    10:01:ef:99:43:f0:f7:ee:07:54:0f:39:cd:de:43:b9:
                    9a:ec:22:4e:8d:8c:e6:2e:a3:82:48:d2:55:96:e4:47:
                    44:10:62:d7:ff:a8:00:c6:1e:94:bc:f5:da:28:f5:72:
                    84:48:05:46:df:b8:11:ad:9b:fb:e8:e5:63:5c:14:b0:
                    0e:24:de:96:3e:ea:61:af:d2:a9:e7:cc:2c:ae:c1:fc:
                    e8:a5:82:b9:7e:fd:09:0c:8b:10:ef:90:8d:85:7a:6e:
                    6c:df:78:f2:70:dc:00:13:2c:23:a9:f6:35:be:d9:6b:
                    5d:f6:9a:d8:3c:41:51:25:f8:9e:7c:69:57:01:c4:22:
                    eb:80:0d:a8:66:c1:f0:b3:84:d1:ef:fa:1b:40:4b:d2:
                    f4:65:cc:fb:92:dc:7c:12:37:12:0d:6c:bd:7f:19:30:
                    25:6c:48:a7:7a:9f:6c:ef:50:a9:e7:5d:f2:94:74:f9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL Client,SSL Server,S/MIME>

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        99:4f:a4:e4:9b:21:9e:b1:e9:55:c1:91:43:50:08:50:
        49:f5:7b:80:12:d2:da:e2:12:33:eb:6f:30:82:e9:48:
        7f:fc:e2:cd:73:f2:7f:c9:0d:4d:0f:59:df:8d:20:6e:
        45:03:28:fb:fa:ee:07:cb:3b:03:a4:5e:fe:88:f5:62:
        32:69:37:48:a8:0a:2a:e4:48:e4:ae:d0:2f:07:b3:3e:
        09:56:ec:08:f6:48:c6:66:94:23:13:c8:7d:f2:ae:82:
        80:e8:eb:12:9a:f5:14:a6:45:68:1a:3d:15:78:3a:5d:
        90:7c:6e:10:b8:6e:59:e6:b9:53:ba:a0:cb:3d:66:2e:
        ae:d1:de:ad:de:3d:31:e0:d3:e1:8a:75:dc:41:76:3b:
        ca:76:2d:6f:c3:1f:2d:7e:c1:ed:ed:b4:6a:0f:49:b4:
        63:7a:9e:99:4e:f9:fe:23:61:e3:b9:d8:86:60:52:74:
        62:6e:9e:d4:aa:95:27:d7:13:64:d0:bc:83:e6:91:cc:
        da:e9:a8:08:6d:3b:95:f1:c6:4e:69:c1:23:75:44:35:
        c7:83:41:1a:50:3b:ff:b0:fa:3a:99:68:5e:df:e2:9f:
        86:b2:3f:0e:4f:be:d7:a9:f7:59:1f:8a:eb:e7:6f:5f:
        3b:c8:92:9e:41:cb:81:5b:14:59:1c:d0:62:b2:7a:bd
    Fingerprint (SHA-256):
        25:C8:8D:11:15:22:5E:02:EB:2F:BF:59:9A:19:9E:3A:85:6B:1A:E3:84:1D:F9:C7:8A:42:65:3F:0C:FB:11:37
    Fingerprint (SHA1):
        9A:D4:59:B0:03:B9:34:62:43:AF:62:7E:5A:3B:52:2B:B0:5A:9E:BA

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #362: Certificate Type Extension (9) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt10 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > 		0 - Server Auth
		1 - Client Auth
		2 - Code Signing
		3 - Email Protection
		4 - Timestamp
		5 - OCSP Responder
		6 - Step-up
		7 - Microsoft Trust List Signing
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt10
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a9:fc:70:f5
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Fri May 19 17:05:44 2017
            Not After : Sat Aug 19 17:05:44 2017
        Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:14:b1:ff:55:ed:82:2b:f7:ae:40:77:4a:7b:b0:27:
                    26:24:d1:6c:9b:cb:55:fa:da:5c:9a:72:ba:2f:e2:1e:
                    f2:b7:69:40:df:e4:f8:1c:b7:7d:e8:ae:22:c8:3a:73:
                    7d:9b:e9:e7:e7:08:b7:47:22:2b:0d:7e:b8:9c:ed:72:
                    da:bd:31:42:13:77:2f:af:0b:70:99:6a:f6:80:25:b4:
                    1c:88:d4:63:85:0c:67:45:b3:45:dd:e7:b0:ac:1b:4a:
                    09:cb:e5:07:ff:c6:4e:48:f4:2c:e6:f0:de:44:ca:d5:
                    ed:04:de:ae:44:e8:d9:10:29:5a:a6:98:db:bb:a1:44:
                    e5:70:2d:ba:2e:d1:4e:c1:5f:e0:b8:18:53:d0:85:ec:
                    bc:b7:cc:17:ae:e5:d3:62:49:79:9d:0e:ff:c6:91:81:
                    c3:5b:e1:80:4b:40:8b:eb:ca:87:9c:24:d4:00:46:9c:
                    0d:48:47:23:51:b2:ef:c3:82:6a:bb:c5:20:94:14:56:
                    89:e9:d8:5e:05:0e:f8:e8:80:af:3f:7f:92:be:63:fd:
                    2d:1a:56:cd:b8:f0:f2:57:29:b0:e7:c2:ce:a2:bd:fe:
                    ba:f6:4a:1e:7c:11:83:0a:f8:12:d4:7d:9d:3c:c7:1e:
                    df:55:d3:2b:13:2e:85:00:67:10:55:4f:05:53:ba:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Extended Key Usage
            Critical: True
                TLS Web Server Authentication Certificate
                TLS Web Client Authentication Certificate
                Code Signing Certificate
                E-Mail Protection Certificate
                Time Stamping Certifcate
                OCSP Responder Certificate
                Strong Crypto Export Approved

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        3e:18:1d:3a:19:02:eb:9b:fb:f2:d0:dc:fb:14:0b:6a:
        25:ee:a8:61:3e:ed:0c:26:b5:4e:55:c2:34:17:bd:36:
        38:91:42:f3:b4:4e:76:57:7a:19:84:91:4e:50:bf:78:
        0d:90:3a:54:34:01:a2:90:94:2d:00:51:b2:5b:8e:94:
        9e:33:e1:30:d2:f1:51:6b:97:e4:c4:f3:2b:b6:37:84:
        6b:d1:66:df:fa:aa:71:a4:f9:a1:63:50:3f:b2:e3:05:
        71:33:06:f9:03:69:bb:56:ee:1b:db:9b:a7:8c:2f:74:
        f1:9c:cb:9c:ee:e5:b1:76:61:a4:9f:63:79:8f:16:44:
        e7:49:03:29:ac:93:7c:f5:04:9d:6b:72:f2:8c:48:e3:
        97:45:9e:25:99:9a:93:7f:79:76:b9:44:3d:77:cd:f7:
        d1:b5:ba:da:d5:d8:c2:25:75:d9:0a:c8:a7:56:c6:62:
        31:40:93:1a:52:89:97:0a:67:92:c6:9f:75:f3:43:7a:
        96:0f:82:97:3d:cd:36:a1:d1:95:93:c8:79:a2:ae:67:
        bb:66:6c:f8:c1:b7:f7:e4:7f:dc:46:c9:33:b2:a3:82:
        fa:df:f9:77:b4:e8:c1:70:33:fa:be:48:ad:8c:cc:89:
        a7:db:2d:71:dc:4f:77:44:fe:37:b4:5e:b2:f9:b5:b4
    Fingerprint (SHA-256):
        12:C9:D8:56:5F:63:05:37:C1:25:69:B5:0B:C4:96:78:6C:D0:B1:78:04:5E:DF:AA:F2:BF:0B:F5:5D:42:05:E2
    Fingerprint (SHA1):
        23:6B:58:B1:3D:96:9D:C4:70:74:DA:24:F8:30:81:45:B9:12:43:AC

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #363: Extended Key Usage Extension (10) - PASSED

certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -S -n TestExt11 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/test.args
certutil options:

1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -L -n TestExt11
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a9:fc:71:07
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Fri May 19 17:05:53 2017
            Not After : Sat Aug 19 17:05:53 2017
        Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:0f:95:a0:03:95:a8:89:96:61:20:0d:ce:3a:ff:d3:
                    fc:d2:fe:ad:06:b1:59:9f:54:1a:d5:05:01:48:f0:6c:
                    b9:87:cc:9b:79:9f:37:29:8b:ab:b3:1e:31:c8:77:c8:
                    5e:ee:b4:5d:73:ee:3f:3c:f7:58:93:e9:c3:3e:96:ba:
                    6c:cd:4c:ec:7e:06:8a:83:84:52:d0:f8:76:73:a1:4a:
                    42:fd:1b:5b:a1:04:2c:25:12:e2:ec:88:2c:ab:e3:0c:
                    71:15:c8:12:38:13:61:d9:d8:09:d3:48:59:b4:a5:c0:
                    00:ae:54:43:03:8f:76:bf:44:9c:65:e1:ae:7e:bd:8c:
                    b9:24:4f:80:ab:a9:cb:d3:c1:fc:1e:2e:f0:32:7e:e4:
                    11:86:05:c7:08:75:5c:f6:9a:1c:41:c3:f7:bf:92:dc:
                    25:19:03:3d:75:55:fc:43:bc:2a:6d:85:95:8a:cf:c0:
                    1b:a9:71:36:c1:34:7a:a6:34:68:18:8f:3f:89:ee:8e:
                    89:be:e6:5a:64:01:72:6d:9c:84:e6:f6:d1:2c:0b:78:
                    bc:5a:d2:6b:29:bc:ba:48:6e:cc:2d:87:79:9f:b4:08:
                    d2:67:15:b8:de:97:74:5f:b6:d9:5d:10:46:20:4e:87:
                    be:7f:0a:f5:96:ed:ab:47:cc:b2:3c:d0:bc:7f:12:6b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        7e:1c:77:83:00:e9:58:c0:da:e5:1a:ed:ad:ec:32:8a:
        3f:2a:50:14:63:66:4b:26:db:92:18:59:d1:00:9a:18:
        c9:19:59:23:39:1f:cd:50:f4:60:ac:2d:84:64:e9:3f:
        55:2e:4d:cd:fa:c3:a1:1e:70:e4:93:3e:1b:4e:e2:96:
        81:08:de:e6:f8:4d:4c:a1:cf:3e:5d:60:33:b9:76:ae:
        f4:12:45:14:7f:98:b2:5e:37:f7:53:1a:eb:17:3a:61:
        3d:3e:b0:4b:e0:aa:cf:55:1c:d6:fe:55:fb:31:51:b7:
        65:3d:56:b4:b9:c0:e5:a8:f9:36:c7:38:9e:12:f2:c4:
        16:7d:b4:1a:84:51:22:7b:5b:c7:0a:54:5f:de:ea:fd:
        99:4c:80:7a:dc:b4:27:e0:7d:88:9f:c9:5f:5c:12:86:
        91:ca:30:6e:37:99:07:a0:f3:0a:f7:c9:8c:01:f6:b3:
        e7:39:4a:39:1c:5f:a1:86:ef:3e:1e:38:fe:c5:17:79:
        ec:6e:2a:16:05:7a:0e:df:d2:0f:63:4b:b3:19:75:8c:
        6e:bd:95:1f:72:73:fe:b4:d8:d5:70:27:7f:5f:6a:c1:
        3e:d5:f2:ba:22:2f:eb:80:70:91:4f:45:3a:07:3c:47:
        05:6f:76:c3:f2:a8:56:50:4c:b8:4b:57:53:fc:c4:b4
    Fingerprint (SHA-256):
        D9:58:53:F2:F6:5C:C9:80:A4:B4:97:0A:10:F8:72:F6:97:4D:30:4E:78:36:0D:A5:6A:AF:17:67:73:BF:D1:EE
    Fingerprint (SHA1):
        01:02:E8:91:CF:C7:22:A8:DE:84:C7:EB:27:DB:6A:08:FC:F8:08:F8

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #364: Certificate Key Usage Extension (11) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com


Generating key.  This may take a few moments...

certutil: Problem creating SubjectAltName extension: error 0: Success
certutil: unable to create cert (Success)
cert.sh: #365: create cert with invalid SAN parameter (12) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com


Generating key.  This may take a few moments...

certutil: Problem creating SubjectAltName extension: error 0: Success
certutil: unable to create cert (Success)
cert.sh: #366: create cert with invalid SAN parameter (13) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com


Generating key.  This may take a few moments...

cert.sh: #367: create cert with valid SAN parameter (14) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -L -n WithSAN
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a9:fc:71:2a
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=example.com"
        Validity:
            Not Before: Fri May 19 17:06:05 2017
            Not After : Sat Aug 19 17:06:05 2017
        Subject: "CN=example.com"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:e7:0a:ab:c7:95:87:33:5e:83:89:23:3f:e5:b0:dc:
                    b6:ee:19:e7:96:38:79:23:57:0a:39:2a:2f:d5:6a:85:
                    7a:a4:25:f9:de:65:f3:9d:62:22:08:4b:91:6a:41:86:
                    2f:6f:f2:ae:c1:41:a5:cb:d8:57:63:36:f6:f0:bc:1a:
                    37:ec:2b:4a:4c:f0:75:a8:4a:80:c4:58:b6:66:cd:d4:
                    d9:66:e4:f7:5b:d7:88:fd:31:a5:a4:43:70:4c:ff:ca:
                    1b:28:24:7f:89:e1:d0:96:cc:1b:9a:a7:45:49:aa:af:
                    d0:51:32:e4:e0:f6:41:45:c9:c4:84:52:1e:4e:be:de:
                    e7:63:e6:6c:62:ca:eb:56:36:7b:4d:c4:68:e9:73:3c:
                    16:f7:06:75:ff:05:59:bc:0b:8c:84:c2:34:51:ef:e7:
                    d1:c6:f9:14:db:6c:00:5a:b8:47:f0:b2:0d:75:aa:37:
                    0c:19:0c:95:59:71:23:8d:2b:e7:b0:fa:1d:3e:0a:a8:
                    64:74:10:c6:36:37:60:4a:39:8d:ee:d3:fc:31:08:b2:
                    ae:cc:9b:b1:6d:54:53:af:c5:64:1b:a4:5b:85:1e:b3:
                    df:46:28:67:bb:bf:d2:a5:42:5b:b5:b8:16:49:f4:1c:
                    aa:63:2f:b2:80:f2:8c:7d:52:22:ed:91:be:56:af:c9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Subject Alt Name
            DNS name: "example.com"
            DNS name: "www.example.com"

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        48:cc:11:02:22:56:1e:cc:72:34:87:45:de:48:a7:96:
        76:e5:a4:70:e0:e0:c5:d3:6b:b1:7a:e8:4e:67:26:39:
        eb:8a:df:4e:9e:bb:a2:79:c8:8c:44:b5:57:9f:a5:35:
        58:46:a8:ac:0a:fb:64:5d:1d:2a:dd:f2:b7:49:04:ee:
        a6:36:e2:6d:e4:f3:ad:34:df:54:fb:3f:54:ac:3e:6b:
        3a:59:94:50:94:f7:77:37:ee:aa:af:5f:18:72:40:d8:
        3f:af:66:64:72:63:70:3c:a0:fe:82:74:12:4d:0d:8b:
        3c:57:72:cc:69:f8:04:7d:80:60:f8:5b:42:ab:b3:7d:
        2b:6c:a1:b1:12:22:34:42:41:d0:a7:c0:3d:2a:f7:1f:
        f2:28:ef:66:11:ad:ff:5a:8e:18:1a:79:70:a1:f5:5c:
        56:83:3a:39:7f:83:71:d1:bf:cd:d3:df:6c:ca:e1:3f:
        9b:92:1a:06:04:82:3a:ce:cd:41:3a:67:04:e7:0a:79:
        47:24:18:9e:9c:37:c2:90:99:87:e9:a6:22:c4:62:d3:
        fa:ad:1e:d6:f7:f1:54:78:3d:7f:c4:ae:d1:7e:36:34:
        98:39:c1:8e:e2:d7:e4:bb:87:2e:77:60:2e:61:0a:85:
        51:19:fe:90:66:18:b7:1f:e2:ad:6a:c3:fd:79:8f:4c
    Fingerprint (SHA-256):
        80:C8:E1:36:C1:F8:42:C1:82:1D:8A:90:C7:76:62:DC:77:1F:22:2A:E9:91:64:65:1F:4B:4C:CA:22:8C:3F:CD
    Fingerprint (SHA1):
        51:E4:D6:CE:91:B3:07:74:3B:03:5D:11:15:AA:B0:E1:1B:C1:E8:2C

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User

cert.sh: #368: create cert with valid SAN parameter (15) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17
writing output to /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/sanext.der
cert.sh: #369: dump extension 2.5.29.17 to file /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/sanext.der (16) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -D -n WithSAN
cert.sh: #370: create cert with valid SAN parameter (17) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -L -n WithSAN
certutil: Could not find cert: WithSAN
: PR_FILE_NOT_FOUND_ERROR: File not found
certutil: Could not find cert: WithSAN
: PR_FILE_NOT_FOUND_ERROR: File not found
cert.sh: #371: expect failure to list cert, because we deleted it (18) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/sanext.der


Generating key.  This may take a few moments...

certutil: error parsing generic extension parameter /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/sanext.der: error 0: Success
cert.sh: #372: create cert with invalid generic ext parameter (19) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/sanext.der


Generating key.  This may take a few moments...

certutil: error parsing generic extension parameter not-critical:/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/sanext.der: error 0: Success
cert.sh: #373: create cert with invalid generic ext parameter (20) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/sanext.der,2.5.29.17:critical:/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/sanext.der


Generating key.  This may take a few moments...

certutil: error parsing generic extension parameter not-critical:/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/sanext.der,2.5.29.17:critical:/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/sanext.der: error 0: Success
cert.sh: #374: create cert with invalid generic ext parameter (21) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions/sanext.der


Generating key.  This may take a few moments...

cert.sh: #375: create cert with valid generic ext parameter (22) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -L -n WithSAN
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:a9:fc:71:60
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=example.com"
        Validity:
            Not Before: Fri May 19 17:06:35 2017
            Not After : Sat Aug 19 17:06:35 2017
        Subject: "CN=example.com"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:4d:6c:01:2a:7f:eb:6c:cd:09:0d:2f:7a:77:d2:fe:
                    85:69:49:14:d1:30:23:37:46:dc:35:f2:a1:c3:d8:0d:
                    77:98:a7:7b:dd:0a:50:1d:8a:d4:4b:4d:8d:8d:2e:67:
                    82:f8:98:6f:a0:35:9e:d5:b7:18:3a:27:71:ec:40:fe:
                    fd:75:b9:1d:29:21:f7:62:a5:35:17:3b:30:9c:d2:1d:
                    e3:e8:ca:e9:14:7a:c2:9a:98:a7:da:a2:91:96:ff:13:
                    bf:bb:f5:a4:aa:98:11:6a:15:f1:b1:b8:5b:87:bd:63:
                    c3:55:46:18:7a:23:13:f9:31:61:30:5e:63:43:6c:62:
                    6c:d8:b6:2b:31:13:66:b5:59:03:c6:4a:62:07:96:ea:
                    c5:c0:50:11:9e:58:27:e4:6a:c1:09:f1:df:7e:59:b5:
                    b8:67:85:72:ba:e0:91:6b:9c:62:a4:59:bb:57:be:31:
                    45:e7:85:e6:c0:6f:bd:d7:d6:f4:b2:21:d3:22:62:e9:
                    e3:2a:e0:8a:74:9c:0e:43:40:fe:eb:4d:3a:a9:65:a9:
                    24:b2:cc:d7:d1:33:6c:9b:af:84:0f:1e:bb:e8:b9:74:
                    9a:25:da:bb:27:ee:d5:45:f7:cd:1e:32:55:ba:2a:d0:
                    c7:f4:0d:f3:3f:58:d3:b3:df:87:03:f9:85:e1:36:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Subject Alt Name
            DNS name: "example.com"
            DNS name: "www.example.com"

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        47:17:e1:51:fb:e9:07:b4:9d:5c:a7:cf:f2:1a:00:90:
        7a:9a:c2:6a:ba:28:f7:5a:d3:7e:34:c4:4a:80:e6:61:
        fc:c7:80:b1:9d:56:c0:90:1c:da:c8:b8:45:cc:35:c5:
        bd:dc:23:b8:18:70:4c:82:a3:99:01:31:d6:85:b7:82:
        8e:78:de:c1:37:17:d3:60:c6:2a:38:4b:f7:5f:87:8a:
        db:85:46:56:f8:be:bc:8f:60:99:f1:a5:ff:d3:25:ad:
        68:79:5b:60:a3:c1:9a:37:a2:e4:6a:d9:6e:ef:28:3e:
        9c:d0:0a:42:4b:c1:cd:e6:a1:b9:82:3d:56:5c:b3:e4:
        48:f5:75:a8:70:a6:06:00:33:5b:8c:b5:54:be:e0:95:
        92:40:fe:1a:72:10:d5:30:1c:c9:a4:16:00:2f:4b:55:
        5c:ea:aa:8d:9a:b7:9a:94:83:55:41:ff:5c:1c:08:06:
        54:79:9e:cd:b8:bd:84:e4:04:c3:df:66:de:44:35:af:
        f5:b1:75:9a:5c:bc:44:cf:2a:92:58:89:05:a9:51:e8:
        55:1d:00:cd:95:9e:ea:1b:fc:4a:21:b9:91:ee:ed:89:
        de:4b:ac:e6:72:74:3b:8f:05:1e:42:4a:5c:32:3f:d6:
        ce:6f:37:b7:82:fa:92:d4:87:3e:ed:00:ea:86:69:47
    Fingerprint (SHA-256):
        5E:34:3E:5A:DF:3C:D9:22:AF:FC:4B:8A:3D:41:3A:46:7C:01:A6:16:A1:61:77:F0:C6:AD:FA:22:4D:63:94:D2
    Fingerprint (SHA1):
        58:C3:D6:BF:18:76:F3:5C:F9:43:D7:E6:2A:14:DD:78:44:F7:EB:16

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User

cert.sh: #376: create cert with valid generic ext parameter (23) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -D -n WithSAN
cert.sh: #377: create cert with valid generic ext parameter (24) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cert_extensions -f ../tests.pw -L -n WithSAN
certutil: Could not find cert: WithSAN
: PR_FILE_NOT_FOUND_ERROR: File not found
certutil: Could not find cert: WithSAN
: PR_FILE_NOT_FOUND_ERROR: File not found
cert.sh: #378: expect failure to list cert, because we deleted it (25) - PASSED
cert.sh: Create A Password Test Cert  ==============
cert.sh: Create A Password Test Ca  --------
cert.sh: Creating a CA Certificate PasswordCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dbpass
cert.sh: Creating CA Cert DB --------------------------
certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dbpass -f ../tests.pw
cert.sh: #379: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dbpass

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #380: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert PasswordCA  --------------------------
certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #381: Creating CA Cert PasswordCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n PasswordCA -r -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dbpass -o root.cert
cert.sh: #382: Exporting Root Cert - PASSED
cert.sh: Changing password on Password Test Cert's Cert DB --------------------------
certutil -W -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dbpass -f ../tests.pw -@ ../tests.fipspw
Password changed successfully.
cert.sh: #383: Changing password on Password Test Cert's Cert DB - PASSED
cert.sh: Generate Certificate for Password Test Cert with new password --------------------------
certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dbpass -f ../tests.fipspw -z ../tests_noise


Generating key.  This may take a few moments...

Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #384: Generate Certificate for Password Test Cert with new password - PASSED
cert.sh SUCCESS: PASSWORD passed
cert.sh: Verify Certificate for Password Test Cert with new password --------------------------
certutil -V -n PasswordCert -u S -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/dbpass -f ../tests.fipspw
certutil: certificate is valid
cert.sh: #385: Verify Certificate for Password Test Cert with new password - PASSED
cert.sh: Creating Distrusted Certificate
cert.sh: Initializing Distrusted's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw
cert.sh: #386: Initializing Distrusted's Cert DB - PASSED
cert.sh: Loading root cert module to Distrusted's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #387: Loading root cert module to Distrusted's Cert DB - PASSED
cert.sh: Import Root CA for Distrusted --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -i ../CA/TestCA.ca.cert
cert.sh: #388: Import Root CA for Distrusted - PASSED
cert.sh: Import DSA Root CA for Distrusted --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -i ../CA/TestCA-dsa.ca.cert
cert.sh: #389: Import DSA Root CA for Distrusted - PASSED
cert.sh: Import EC Root CA for Distrusted --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -i ../CA/TestCA-ec.ca.cert
cert.sh: #390: Import EC Root CA for Distrusted - PASSED
cert.sh: Generate Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #391: Generate Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's Request --------------------------
certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw 
cert.sh: #392: Sign Distrusted's Request - PASSED
cert.sh: Import Distrusted's Cert --------------------------
certutil -A -n Distrusted -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw -i Distrusted.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #393: Import Distrusted's Cert - PASSED
cert.sh SUCCESS: Distrusted's Cert Created
cert.sh: Generate DSA Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #394: Generate DSA Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw 
cert.sh: #395: Sign Distrusted's DSA Request - PASSED
cert.sh: Import Distrusted's DSA Cert --------------------------
certutil -A -n Distrusted-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw -i Distrusted-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #396: Import Distrusted's DSA Cert - PASSED
cert.sh SUCCESS: Distrusted's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #397: Generate mixed DSA Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw 
cert.sh: #398: Sign Distrusted's DSA Request with RSA - PASSED
cert.sh: Import Distrusted's mixed DSA Cert --------------------------
certutil -A -n Distrusted-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw -i Distrusted-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #399: Import Distrusted's mixed DSA Cert - PASSED
cert.sh SUCCESS: Distrusted's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #400: Generate EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request --------------------------
certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw 
cert.sh: #401: Sign Distrusted's EC Request - PASSED
cert.sh: Import Distrusted's EC Cert --------------------------
certutil -A -n Distrusted-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw -i Distrusted-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #402: Import Distrusted's EC Cert - PASSED
cert.sh SUCCESS: Distrusted's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #403: Generate mixed EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request with RSA --------------------------
certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw 
cert.sh: #404: Sign Distrusted's EC Request with RSA - PASSED
cert.sh: Import Distrusted's mixed EC Cert --------------------------
certutil -A -n Distrusted-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #405: Import Distrusted's mixed EC Cert - PASSED
cert.sh SUCCESS: Distrusted's mixed EC Cert Created
cert.sh: Mark CERT as unstrusted --------------------------
certutil -M -n Distrusted -t p,p,p -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw
cert.sh: #406: Mark CERT as unstrusted - PASSED
cert.sh: Creating Distrusted Intermediate
cert.sh: Creating a CA Certificate DistrustedCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA
cert.sh: Creating CA Cert DistrustedCA  --------------------------
certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #407: Creating CA Cert DistrustedCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n DistrustedCA -r -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA -o root.cert
cert.sh: #408: Exporting Root Cert - PASSED
cert.sh: Import Distrusted Intermediate --------------------------
certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -i ../CA/DistrustedCA.ca.cert
cert.sh: #409: Import Distrusted Intermediate - PASSED
cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA --------------------------
certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #410: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED
cp: `./req' and `/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA/req' are the same file
cert.sh: Sign LeafChainedToDistrustedCA's Request --------------------------
certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw
cert.sh: #411: Sign LeafChainedToDistrustedCA's Request - PASSED
cert.sh: Import LeafChainedToDistrustedCA's Cert  -t u,u,u --------------------------
certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #412: Import LeafChainedToDistrustedCA's Cert  -t u,u,u - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server --------------------------
certutil -V -n LeafChainedToDistrustedCA -u V -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #413: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client --------------------------
certutil -V -n LeafChainedToDistrustedCA -u C -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #414: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u S -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #415: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient --------------------------
certutil -V -n LeafChainedToDistrustedCA -u R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #416: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder --------------------------
certutil -V -n LeafChainedToDistrustedCA -u O -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #417: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u J -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #418: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED
cert.sh: Verify Distrusted Cert for SSL Server --------------------------
certutil -V -n Distrusted -u V -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #419: Verify Distrusted Cert for SSL Server - PASSED
cert.sh: Verify Distrusted Cert for SSL Client --------------------------
certutil -V -n Distrusted -u C -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #420: Verify Distrusted Cert for SSL Client - PASSED
cert.sh: Verify Distrusted Cert for Email signer --------------------------
certutil -V -n Distrusted -u S -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #421: Verify Distrusted Cert for Email signer - PASSED
cert.sh: Verify Distrusted Cert for Email recipient --------------------------
certutil -V -n Distrusted -u R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #422: Verify Distrusted Cert for Email recipient - PASSED
cert.sh: Verify Distrusted Cert for OCSP responder --------------------------
certutil -V -n Distrusted -u O -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #423: Verify Distrusted Cert for OCSP responder - PASSED
cert.sh: Verify Distrusted Cert for Object Signer --------------------------
certutil -V -n Distrusted -u J -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #424: Verify Distrusted Cert for Object Signer - PASSED
cert.sh: OCSP response creation selftest
cert.sh: perform selftest --------------------------
ocspresp /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/serverCA serverCA chain-1-serverCA -f ../tests.pw
cert.sh: #425: perform selftest - PASSED
cert.sh: Creating Client CA Issued Certificates Range 40 - 52 ===
cert.sh: Generate Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #426: Generate Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw 
cert.sh: #427: Sign TestUser40's Request - PASSED
cert.sh: Import TestUser40's Cert --------------------------
certutil -A -n TestUser40 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser40.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #428: Import TestUser40's Cert - PASSED
cert.sh SUCCESS: TestUser40's Cert Created
cert.sh: Generate DSA Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #429: Generate DSA Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw 
cert.sh: #430: Sign TestUser40's DSA Request - PASSED
cert.sh: Import TestUser40's DSA Cert --------------------------
certutil -A -n TestUser40-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser40-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #431: Import TestUser40's DSA Cert - PASSED
cert.sh SUCCESS: TestUser40's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #432: Generate mixed DSA Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw 
cert.sh: #433: Sign TestUser40's DSA Request with RSA - PASSED
cert.sh: Import TestUser40's mixed DSA Cert --------------------------
certutil -A -n TestUser40-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser40-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #434: Import TestUser40's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser40's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #435: Generate EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw 
cert.sh: #436: Sign TestUser40's EC Request - PASSED
cert.sh: Import TestUser40's EC Cert --------------------------
certutil -A -n TestUser40-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser40-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #437: Import TestUser40's EC Cert - PASSED
cert.sh SUCCESS: TestUser40's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #438: Generate mixed EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw 
cert.sh: #439: Sign TestUser40's EC Request with RSA - PASSED
cert.sh: Import TestUser40's mixed EC Cert --------------------------
certutil -A -n TestUser40-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser40-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #440: Import TestUser40's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser40's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #441: Generate Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's Request --------------------------
certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw 
cert.sh: #442: Sign TestUser41's Request - PASSED
cert.sh: Import TestUser41's Cert --------------------------
certutil -A -n TestUser41 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser41.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #443: Import TestUser41's Cert - PASSED
cert.sh SUCCESS: TestUser41's Cert Created
cert.sh: Generate DSA Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #444: Generate DSA Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw 
cert.sh: #445: Sign TestUser41's DSA Request - PASSED
cert.sh: Import TestUser41's DSA Cert --------------------------
certutil -A -n TestUser41-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser41-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #446: Import TestUser41's DSA Cert - PASSED
cert.sh SUCCESS: TestUser41's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #447: Generate mixed DSA Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw 
cert.sh: #448: Sign TestUser41's DSA Request with RSA - PASSED
cert.sh: Import TestUser41's mixed DSA Cert --------------------------
certutil -A -n TestUser41-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser41-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #449: Import TestUser41's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser41's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #450: Generate EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request --------------------------
certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw 
cert.sh: #451: Sign TestUser41's EC Request - PASSED
cert.sh: Import TestUser41's EC Cert --------------------------
certutil -A -n TestUser41-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser41-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #452: Import TestUser41's EC Cert - PASSED
cert.sh SUCCESS: TestUser41's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #453: Generate mixed EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw 
cert.sh: #454: Sign TestUser41's EC Request with RSA - PASSED
cert.sh: Import TestUser41's mixed EC Cert --------------------------
certutil -A -n TestUser41-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser41-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #455: Import TestUser41's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser41's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #456: Generate Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's Request --------------------------
certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw 
cert.sh: #457: Sign TestUser42's Request - PASSED
cert.sh: Import TestUser42's Cert --------------------------
certutil -A -n TestUser42 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser42.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #458: Import TestUser42's Cert - PASSED
cert.sh SUCCESS: TestUser42's Cert Created
cert.sh: Generate DSA Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #459: Generate DSA Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw 
cert.sh: #460: Sign TestUser42's DSA Request - PASSED
cert.sh: Import TestUser42's DSA Cert --------------------------
certutil -A -n TestUser42-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser42-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #461: Import TestUser42's DSA Cert - PASSED
cert.sh SUCCESS: TestUser42's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #462: Generate mixed DSA Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw 
cert.sh: #463: Sign TestUser42's DSA Request with RSA - PASSED
cert.sh: Import TestUser42's mixed DSA Cert --------------------------
certutil -A -n TestUser42-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser42-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #464: Import TestUser42's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser42's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #465: Generate EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request --------------------------
certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw 
cert.sh: #466: Sign TestUser42's EC Request - PASSED
cert.sh: Import TestUser42's EC Cert --------------------------
certutil -A -n TestUser42-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser42-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #467: Import TestUser42's EC Cert - PASSED
cert.sh SUCCESS: TestUser42's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #468: Generate mixed EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw 
cert.sh: #469: Sign TestUser42's EC Request with RSA - PASSED
cert.sh: Import TestUser42's mixed EC Cert --------------------------
certutil -A -n TestUser42-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser42-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #470: Import TestUser42's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser42's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #471: Generate Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's Request --------------------------
certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw 
cert.sh: #472: Sign TestUser43's Request - PASSED
cert.sh: Import TestUser43's Cert --------------------------
certutil -A -n TestUser43 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser43.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #473: Import TestUser43's Cert - PASSED
cert.sh SUCCESS: TestUser43's Cert Created
cert.sh: Generate DSA Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #474: Generate DSA Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw 
cert.sh: #475: Sign TestUser43's DSA Request - PASSED
cert.sh: Import TestUser43's DSA Cert --------------------------
certutil -A -n TestUser43-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser43-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #476: Import TestUser43's DSA Cert - PASSED
cert.sh SUCCESS: TestUser43's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #477: Generate mixed DSA Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw 
cert.sh: #478: Sign TestUser43's DSA Request with RSA - PASSED
cert.sh: Import TestUser43's mixed DSA Cert --------------------------
certutil -A -n TestUser43-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser43-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #479: Import TestUser43's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser43's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #480: Generate EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request --------------------------
certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw 
cert.sh: #481: Sign TestUser43's EC Request - PASSED
cert.sh: Import TestUser43's EC Cert --------------------------
certutil -A -n TestUser43-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser43-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #482: Import TestUser43's EC Cert - PASSED
cert.sh SUCCESS: TestUser43's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #483: Generate mixed EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw 
cert.sh: #484: Sign TestUser43's EC Request with RSA - PASSED
cert.sh: Import TestUser43's mixed EC Cert --------------------------
certutil -A -n TestUser43-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser43-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #485: Import TestUser43's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser43's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #486: Generate Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's Request --------------------------
certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw 
cert.sh: #487: Sign TestUser44's Request - PASSED
cert.sh: Import TestUser44's Cert --------------------------
certutil -A -n TestUser44 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser44.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #488: Import TestUser44's Cert - PASSED
cert.sh SUCCESS: TestUser44's Cert Created
cert.sh: Generate DSA Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #489: Generate DSA Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw 
cert.sh: #490: Sign TestUser44's DSA Request - PASSED
cert.sh: Import TestUser44's DSA Cert --------------------------
certutil -A -n TestUser44-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser44-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #491: Import TestUser44's DSA Cert - PASSED
cert.sh SUCCESS: TestUser44's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #492: Generate mixed DSA Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw 
cert.sh: #493: Sign TestUser44's DSA Request with RSA - PASSED
cert.sh: Import TestUser44's mixed DSA Cert --------------------------
certutil -A -n TestUser44-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser44-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #494: Import TestUser44's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser44's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #495: Generate EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request --------------------------
certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw 
cert.sh: #496: Sign TestUser44's EC Request - PASSED
cert.sh: Import TestUser44's EC Cert --------------------------
certutil -A -n TestUser44-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser44-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #497: Import TestUser44's EC Cert - PASSED
cert.sh SUCCESS: TestUser44's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #498: Generate mixed EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw 
cert.sh: #499: Sign TestUser44's EC Request with RSA - PASSED
cert.sh: Import TestUser44's mixed EC Cert --------------------------
certutil -A -n TestUser44-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser44-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #500: Import TestUser44's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser44's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #501: Generate Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's Request --------------------------
certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw 
cert.sh: #502: Sign TestUser45's Request - PASSED
cert.sh: Import TestUser45's Cert --------------------------
certutil -A -n TestUser45 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser45.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #503: Import TestUser45's Cert - PASSED
cert.sh SUCCESS: TestUser45's Cert Created
cert.sh: Generate DSA Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #504: Generate DSA Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw 
cert.sh: #505: Sign TestUser45's DSA Request - PASSED
cert.sh: Import TestUser45's DSA Cert --------------------------
certutil -A -n TestUser45-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser45-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #506: Import TestUser45's DSA Cert - PASSED
cert.sh SUCCESS: TestUser45's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #507: Generate mixed DSA Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw 
cert.sh: #508: Sign TestUser45's DSA Request with RSA - PASSED
cert.sh: Import TestUser45's mixed DSA Cert --------------------------
certutil -A -n TestUser45-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser45-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #509: Import TestUser45's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser45's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #510: Generate EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request --------------------------
certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw 
cert.sh: #511: Sign TestUser45's EC Request - PASSED
cert.sh: Import TestUser45's EC Cert --------------------------
certutil -A -n TestUser45-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser45-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #512: Import TestUser45's EC Cert - PASSED
cert.sh SUCCESS: TestUser45's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #513: Generate mixed EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw 
cert.sh: #514: Sign TestUser45's EC Request with RSA - PASSED
cert.sh: Import TestUser45's mixed EC Cert --------------------------
certutil -A -n TestUser45-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser45-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #515: Import TestUser45's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser45's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #516: Generate Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's Request --------------------------
certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw 
cert.sh: #517: Sign TestUser46's Request - PASSED
cert.sh: Import TestUser46's Cert --------------------------
certutil -A -n TestUser46 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser46.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #518: Import TestUser46's Cert - PASSED
cert.sh SUCCESS: TestUser46's Cert Created
cert.sh: Generate DSA Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #519: Generate DSA Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw 
cert.sh: #520: Sign TestUser46's DSA Request - PASSED
cert.sh: Import TestUser46's DSA Cert --------------------------
certutil -A -n TestUser46-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser46-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #521: Import TestUser46's DSA Cert - PASSED
cert.sh SUCCESS: TestUser46's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #522: Generate mixed DSA Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw 
cert.sh: #523: Sign TestUser46's DSA Request with RSA - PASSED
cert.sh: Import TestUser46's mixed DSA Cert --------------------------
certutil -A -n TestUser46-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser46-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #524: Import TestUser46's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser46's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #525: Generate EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request --------------------------
certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw 
cert.sh: #526: Sign TestUser46's EC Request - PASSED
cert.sh: Import TestUser46's EC Cert --------------------------
certutil -A -n TestUser46-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser46-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #527: Import TestUser46's EC Cert - PASSED
cert.sh SUCCESS: TestUser46's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #528: Generate mixed EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw 
cert.sh: #529: Sign TestUser46's EC Request with RSA - PASSED
cert.sh: Import TestUser46's mixed EC Cert --------------------------
certutil -A -n TestUser46-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser46-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #530: Import TestUser46's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser46's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #531: Generate Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's Request --------------------------
certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw 
cert.sh: #532: Sign TestUser47's Request - PASSED
cert.sh: Import TestUser47's Cert --------------------------
certutil -A -n TestUser47 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser47.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #533: Import TestUser47's Cert - PASSED
cert.sh SUCCESS: TestUser47's Cert Created
cert.sh: Generate DSA Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #534: Generate DSA Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw 
cert.sh: #535: Sign TestUser47's DSA Request - PASSED
cert.sh: Import TestUser47's DSA Cert --------------------------
certutil -A -n TestUser47-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser47-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #536: Import TestUser47's DSA Cert - PASSED
cert.sh SUCCESS: TestUser47's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #537: Generate mixed DSA Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw 
cert.sh: #538: Sign TestUser47's DSA Request with RSA - PASSED
cert.sh: Import TestUser47's mixed DSA Cert --------------------------
certutil -A -n TestUser47-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser47-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #539: Import TestUser47's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser47's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #540: Generate EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request --------------------------
certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw 
cert.sh: #541: Sign TestUser47's EC Request - PASSED
cert.sh: Import TestUser47's EC Cert --------------------------
certutil -A -n TestUser47-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser47-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #542: Import TestUser47's EC Cert - PASSED
cert.sh SUCCESS: TestUser47's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #543: Generate mixed EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw 
cert.sh: #544: Sign TestUser47's EC Request with RSA - PASSED
cert.sh: Import TestUser47's mixed EC Cert --------------------------
certutil -A -n TestUser47-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser47-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #545: Import TestUser47's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser47's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #546: Generate Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's Request --------------------------
certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw 
cert.sh: #547: Sign TestUser48's Request - PASSED
cert.sh: Import TestUser48's Cert --------------------------
certutil -A -n TestUser48 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser48.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #548: Import TestUser48's Cert - PASSED
cert.sh SUCCESS: TestUser48's Cert Created
cert.sh: Generate DSA Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #549: Generate DSA Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw 
cert.sh: #550: Sign TestUser48's DSA Request - PASSED
cert.sh: Import TestUser48's DSA Cert --------------------------
certutil -A -n TestUser48-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser48-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #551: Import TestUser48's DSA Cert - PASSED
cert.sh SUCCESS: TestUser48's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #552: Generate mixed DSA Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw 
cert.sh: #553: Sign TestUser48's DSA Request with RSA - PASSED
cert.sh: Import TestUser48's mixed DSA Cert --------------------------
certutil -A -n TestUser48-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser48-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #554: Import TestUser48's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser48's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #555: Generate EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request --------------------------
certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw 
cert.sh: #556: Sign TestUser48's EC Request - PASSED
cert.sh: Import TestUser48's EC Cert --------------------------
certutil -A -n TestUser48-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser48-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #557: Import TestUser48's EC Cert - PASSED
cert.sh SUCCESS: TestUser48's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #558: Generate mixed EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw 
cert.sh: #559: Sign TestUser48's EC Request with RSA - PASSED
cert.sh: Import TestUser48's mixed EC Cert --------------------------
certutil -A -n TestUser48-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser48-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #560: Import TestUser48's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser48's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #561: Generate Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's Request --------------------------
certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw 
cert.sh: #562: Sign TestUser49's Request - PASSED
cert.sh: Import TestUser49's Cert --------------------------
certutil -A -n TestUser49 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser49.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #563: Import TestUser49's Cert - PASSED
cert.sh SUCCESS: TestUser49's Cert Created
cert.sh: Generate DSA Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #564: Generate DSA Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw 
cert.sh: #565: Sign TestUser49's DSA Request - PASSED
cert.sh: Import TestUser49's DSA Cert --------------------------
certutil -A -n TestUser49-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser49-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #566: Import TestUser49's DSA Cert - PASSED
cert.sh SUCCESS: TestUser49's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #567: Generate mixed DSA Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw 
cert.sh: #568: Sign TestUser49's DSA Request with RSA - PASSED
cert.sh: Import TestUser49's mixed DSA Cert --------------------------
certutil -A -n TestUser49-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser49-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #569: Import TestUser49's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser49's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #570: Generate EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request --------------------------
certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw 
cert.sh: #571: Sign TestUser49's EC Request - PASSED
cert.sh: Import TestUser49's EC Cert --------------------------
certutil -A -n TestUser49-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser49-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #572: Import TestUser49's EC Cert - PASSED
cert.sh SUCCESS: TestUser49's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #573: Generate mixed EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw 
cert.sh: #574: Sign TestUser49's EC Request with RSA - PASSED
cert.sh: Import TestUser49's mixed EC Cert --------------------------
certutil -A -n TestUser49-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser49-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #575: Import TestUser49's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser49's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #576: Generate Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw 
cert.sh: #577: Sign TestUser50's Request - PASSED
cert.sh: Import TestUser50's Cert --------------------------
certutil -A -n TestUser50 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser50.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #578: Import TestUser50's Cert - PASSED
cert.sh SUCCESS: TestUser50's Cert Created
cert.sh: Generate DSA Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #579: Generate DSA Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw 
cert.sh: #580: Sign TestUser50's DSA Request - PASSED
cert.sh: Import TestUser50's DSA Cert --------------------------
certutil -A -n TestUser50-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser50-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #581: Import TestUser50's DSA Cert - PASSED
cert.sh SUCCESS: TestUser50's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #582: Generate mixed DSA Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw 
cert.sh: #583: Sign TestUser50's DSA Request with RSA - PASSED
cert.sh: Import TestUser50's mixed DSA Cert --------------------------
certutil -A -n TestUser50-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser50-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #584: Import TestUser50's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser50's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #585: Generate EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw 
cert.sh: #586: Sign TestUser50's EC Request - PASSED
cert.sh: Import TestUser50's EC Cert --------------------------
certutil -A -n TestUser50-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser50-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #587: Import TestUser50's EC Cert - PASSED
cert.sh SUCCESS: TestUser50's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #588: Generate mixed EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw 
cert.sh: #589: Sign TestUser50's EC Request with RSA - PASSED
cert.sh: Import TestUser50's mixed EC Cert --------------------------
certutil -A -n TestUser50-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser50-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #590: Import TestUser50's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser50's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #591: Generate Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's Request --------------------------
certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw 
cert.sh: #592: Sign TestUser51's Request - PASSED
cert.sh: Import TestUser51's Cert --------------------------
certutil -A -n TestUser51 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser51.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #593: Import TestUser51's Cert - PASSED
cert.sh SUCCESS: TestUser51's Cert Created
cert.sh: Generate DSA Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #594: Generate DSA Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw 
cert.sh: #595: Sign TestUser51's DSA Request - PASSED
cert.sh: Import TestUser51's DSA Cert --------------------------
certutil -A -n TestUser51-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser51-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #596: Import TestUser51's DSA Cert - PASSED
cert.sh SUCCESS: TestUser51's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #597: Generate mixed DSA Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw 
cert.sh: #598: Sign TestUser51's DSA Request with RSA - PASSED
cert.sh: Import TestUser51's mixed DSA Cert --------------------------
certutil -A -n TestUser51-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser51-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #599: Import TestUser51's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser51's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #600: Generate EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request --------------------------
certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw 
cert.sh: #601: Sign TestUser51's EC Request - PASSED
cert.sh: Import TestUser51's EC Cert --------------------------
certutil -A -n TestUser51-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser51-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #602: Import TestUser51's EC Cert - PASSED
cert.sh SUCCESS: TestUser51's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #603: Generate mixed EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw 
cert.sh: #604: Sign TestUser51's EC Request with RSA - PASSED
cert.sh: Import TestUser51's mixed EC Cert --------------------------
certutil -A -n TestUser51-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser51-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #605: Import TestUser51's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser51's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #606: Generate Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's Request --------------------------
certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw 
cert.sh: #607: Sign TestUser52's Request - PASSED
cert.sh: Import TestUser52's Cert --------------------------
certutil -A -n TestUser52 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser52.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #608: Import TestUser52's Cert - PASSED
cert.sh SUCCESS: TestUser52's Cert Created
cert.sh: Generate DSA Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #609: Generate DSA Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw 
cert.sh: #610: Sign TestUser52's DSA Request - PASSED
cert.sh: Import TestUser52's DSA Cert --------------------------
certutil -A -n TestUser52-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser52-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #611: Import TestUser52's DSA Cert - PASSED
cert.sh SUCCESS: TestUser52's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #612: Generate mixed DSA Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw 
cert.sh: #613: Sign TestUser52's DSA Request with RSA - PASSED
cert.sh: Import TestUser52's mixed DSA Cert --------------------------
certutil -A -n TestUser52-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser52-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #614: Import TestUser52's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser52's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #615: Generate EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request --------------------------
certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw 
cert.sh: #616: Sign TestUser52's EC Request - PASSED
cert.sh: Import TestUser52's EC Cert --------------------------
certutil -A -n TestUser52-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser52-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #617: Import TestUser52's EC Cert - PASSED
cert.sh SUCCESS: TestUser52's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #618: Generate mixed EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw 
cert.sh: #619: Sign TestUser52's EC Request with RSA - PASSED
cert.sh: Import TestUser52's mixed EC Cert --------------------------
certutil -A -n TestUser52-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -f ../tests.pw -i TestUser52-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #620: Import TestUser52's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser52's mixed EC Cert Created
cert.sh: Creating CA CRL =====================================
cert.sh: Generating CRL for range 40-42 TestCA authority --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or
cert.sh: #621: Generating CRL for range 40-42 TestCA authority - PASSED
cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority --------------------------
crlutil -q -q -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa
cert.sh: #622: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED
cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority --------------------------
crlutil -q -q -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec
cert.sh: #623: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED
cert.sh: Modifying CA CRL by adding one more cert ============
cert.sh: Modify CRL by adding one more cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or
cert.sh: #624: Modify CRL by adding one more cert - PASSED
cert.sh: Modify CRL (DSA) by adding one more cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa
cert.sh: #625: Modify CRL (DSA) by adding one more cert - PASSED
cert.sh: Modify CRL (ECC) by adding one more cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec
cert.sh: #626: Modify CRL (ECC) by adding one more cert - PASSED
cert.sh: Modifying CA CRL by removing one cert ===============
cert.sh: Modify CRL by removing one cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1
cert.sh: #627: Modify CRL by removing one cert - PASSED
cert.sh: Modify CRL (DSA) by removing one cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1
cert.sh: #628: Modify CRL (DSA) by removing one cert - PASSED
cert.sh: Modify CRL (ECC) by removing one cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec
cert.sh: #629: Modify CRL (ECC) by removing one cert - PASSED
cert.sh: Creating CA CRL for groups 1 and 2  ===============
cert.sh: Creating CRL for groups 1 and 2 --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42
cert.sh: #630: Creating CRL for groups 1 and 2 - PASSED
cert.sh: Creating CRL (ECC) for groups 1 and 2 --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec
cert.sh: #631: Creating CRL (ECC) for groups 1 and 2 - PASSED
cert.sh: Creating CA CRL for groups 1, 2 and 3  ===============
cert.sh: Creating CRL for groups 1, 2 and 3 --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48
cert.sh: #632: Creating CRL for groups 1, 2 and 3 - PASSED
cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec
cert.sh: #633: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED
cert.sh: Importing Server CA Issued CRL for certs  trough 52
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -D -n TestCA -f ../tests.pw -d ../server
crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found.
crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found.
cert.sh: #634: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server
cert.sh: #635: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server
crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found.
crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found.
cert.sh: #636: Importing CRL (ECC) for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server
cert.sh: #637: Importing CRL (ECC) for groups 1 - PASSED
cert.sh SUCCESS: SSL CRL prep passed
cert.sh cert.sh: finished cert.sh
TIMESTAMP cert END: Fri May 19 17:10:22 UTC 2017
Running tests for dbtests
TIMESTAMP dbtests BEGIN: Fri May 19 17:10:22 UTC 2017
dbtests.sh: CERT and Key DB Tests ===============================

---------------------------------------------------------------
| test opening the database read/write in a nonexisting directory
---------------------------------------------------------------
certutil: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format.
dbtests.sh: #638: Certutil didn't work in a nonexisting dir 255 - PASSED
dbdir selected is ./non_existent_dir

ERROR: Directory "./non_existent_dir" does not exist.
dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format.
dbtests.sh: #639: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED

---------------------------------------------------------------
| test force opening the database in a nonexisting directory
---------------------------------------------------------------
dbdir selected is ./non_existent_dir

ERROR: Directory "./non_existent_dir" does not exist.
dbtests.sh: #640: Dbtest force succeeded in a nonexisting dir 0 - PASSED

---------------------------------------------------------------
| test opening the database readonly in an empty directory
---------------------------------------------------------------
tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed
dbtests.sh: #641: Tstclnt didn't work in an empty dir 1 - PASSED
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/emptydir

database checked is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/emptydir/secmod.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/emptydir/secmod.db" does not exist.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/emptydir/cert8.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/emptydir/cert8.db" does not exist.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/emptydir/key3.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/emptydir/key3.db" does not exist.
dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format.
dbtests.sh: #642: Dbtest readonly didn't work in an empty dir 46 - PASSED
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/emptydir

dbtests.sh: #643: Dbtest logout after empty DB Init has key - PASSED
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/emptydir

dbtests.sh: #644: Dbtest password DB Init maintains needlogin state - PASSED
certutil: could not find certificate named "xxxx": SEC_ERROR_BAD_DATABASE: security library: bad database.
dbtests.sh: #645: Certutil didn't work in an empty dir 255 - PASSED

---------------------------------------------------------------
| test force opening the database  readonly in a empty directory
---------------------------------------------------------------
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/emptydir

database checked is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/emptydir/secmod.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/emptydir/secmod.db" does not exist.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/emptydir/cert8.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/emptydir/cert8.db" does not exist.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/emptydir/key3.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/emptydir/key3.db" does not exist.
dbtests.sh: #646: Dbtest force readonly succeeded in an empty dir 0 - PASSED

---------------------------------------------------------------
| test opening the database r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir

ERROR: Directory "/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir" is not writeable.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/secmod.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/secmod.db" is not writeable.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/cert8.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/cert8.db" is not writeable.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/key3.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/key3.db" is not writeable.
dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format.
dbtests.sh: #647: Dbtest r/w didn't work in an readonly dir 46 - PASSED
certutil: could not find certificate named "TestUser": SEC_ERROR_BAD_DATABASE: security library: bad database.
dbtests.sh: #648: Certutil didn't work in an readonly dir 255 - PASSED

---------------------------------------------------------------
| test opening the database ronly in a readonly directory
---------------------------------------------------------------
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir

database checked is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/secmod.db
database checked is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/cert8.db
database checked is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/key3.db
dbtests.sh: #649: Dbtest readonly succeeded in a readonly dir 0 - PASSED

---------------------------------------------------------------
| test force opening the database  r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir

ERROR: Directory "/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir" is not writeable.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/secmod.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/secmod.db" is not writeable.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/cert8.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/cert8.db" is not writeable.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/key3.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/key3.db" is not writeable.
dbtests.sh: #650: Dbtest force succeeded in a readonly dir 0 - PASSED

---------------------------------------------------------------
| ls -l /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir
---------------------------------------------------------------
dr-xr-xr-x 1 buildd buildd    232 May 19 17:10 /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir
-r--r----- 1 buildd buildd   1222 May 19 17:10 /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/TestUser-dsa.cert
-r--r----- 1 buildd buildd   1425 May 19 17:10 /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/TestUser-dsamixed.cert
-r--r----- 1 buildd buildd    577 May 19 17:10 /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/TestUser-ec.cert
-r--r----- 1 buildd buildd    705 May 19 17:10 /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/TestUser-ecmixed.cert
-r--r----- 1 buildd buildd    870 May 19 17:10 /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/TestUser.cert
-r-------- 1 buildd buildd 229376 May 19 17:10 /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/cert8.db
-r-------- 1 buildd buildd 184320 May 19 17:10 /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/key3.db
-r--r----- 1 buildd buildd    394 May 19 17:10 /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/req
-r-------- 1 buildd buildd  16384 May 19 17:10 /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ronlydir/secmod.db

---------------------------------------------------------------
| test creating a new cert with a conflicting nickname
---------------------------------------------------------------
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/conflictdir
certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database.
dbtests.sh: #651: Nicknane conflict test, could not import conflict nickname 255 - PASSED

---------------------------------------------------------------
| test importing an old cert to a conflicting nickname
---------------------------------------------------------------
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 40 (0x28)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:11 2017
            Not After : Thu May 19 17:02:11 2022
        Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif
            ornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d9:7f:75:88:25:61:79:a7:b5:ac:f5:61:99:57:b7:25:
                    ae:da:07:6f:97:fd:7c:ef:dd:19:c2:87:ea:f6:3e:b9:
                    1f:df:96:f8:50:c5:4f:b1:96:d8:3d:3b:23:d3:4c:dd:
                    6e:4a:64:6a:7a:ba:ac:10:43:72:85:0f:31:0b:49:f1:
                    8b:a0:40:3d:47:c5:ae:cc:ad:8a:b6:a6:cf:69:b5:61:
                    5e:b3:39:57:65:c6:b9:f0:30:89:eb:0e:3e:b9:53:55:
                    3d:3f:4d:70:5f:38:d1:7e:59:e7:11:2b:e9:d9:92:82:
                    42:d0:f2:65:2f:ab:27:28:8c:81:1e:5c:a8:4a:d0:f4:
                    51:d9:42:30:cf:37:6c:62:57:d6:a4:2d:79:b8:26:ff:
                    1c:53:b1:43:20:11:e3:f9:34:c6:bf:08:96:ca:19:fc:
                    79:66:2d:03:bd:75:cd:96:54:67:d7:1f:e6:a5:8b:3a:
                    31:82:a7:20:86:43:a2:1e:e1:99:26:65:50:6a:63:66:
                    4b:ea:5a:f5:d3:29:e5:09:db:03:56:ca:7f:ef:a9:f7:
                    20:cf:49:4a:e3:36:3f:ad:50:97:b5:bd:ce:85:81:30:
                    c0:01:c9:74:96:8a:19:18:63:d9:34:26:01:92:64:d1:
                    9f:e1:79:28:52:4d:de:72:22:18:90:cc:d4:ea:b6:8f
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        59:77:3a:c6:a6:c8:02:0f:c6:99:77:84:a9:6b:73:06:
        62:e5:e0:ee:14:0f:e3:87:2c:d8:7d:a5:52:10:36:9c:
        76:1e:3e:e0:da:98:ed:e9:0c:9b:ac:13:30:b4:99:0f:
        6e:4f:08:f3:1e:75:64:87:16:50:47:41:6a:8f:3a:6f:
        f7:bb:2d:89:ad:a2:35:a4:13:a4:83:51:1d:4a:e2:e5:
        76:e4:5f:c2:16:41:8b:9f:3a:87:7d:a0:26:05:3e:45:
        c1:16:d4:87:14:6f:34:a3:2f:19:99:4b:ce:31:e4:24:
        20:af:53:dd:4f:2c:b5:c0:ee:84:7a:0f:ea:b3:72:95:
        13:d8:aa:29:43:52:c4:ca:5d:33:25:dd:f1:5c:47:d9:
        4a:e5:3b:cf:ea:e9:2a:24:86:ee:a7:ca:49:a0:1c:22:
        a5:11:b9:8f:38:71:9e:9c:af:6f:6f:f8:44:06:1f:7c:
        b9:db:6a:d1:e9:c2:5f:16:10:da:34:cb:12:32:da:7b:
        e2:3d:7d:62:8a:0f:92:11:aa:c8:c2:b8:52:6b:86:dc:
        27:b0:eb:70:6f:b1:85:27:3f:e5:bb:28:48:9f:4c:11:
        75:60:e1:80:cf:1b:35:83:3e:e0:4c:81:9a:a8:3b:27:
        d9:08:ad:45:5f:75:10:da:32:7c:63:33:de:0b:82:bf
    Fingerprint (SHA-256):
        45:CE:CE:E9:0A:66:91:E4:7A:AE:3A:6B:C2:3E:BD:BA:93:06:5E:9C:11:03:3B:CF:97:B2:A3:D8:14:34:1B:D5
    Fingerprint (SHA1):
        3D:62:25:E2:CC:AD:23:3A:95:8A:C5:EC:94:C2:4E:51:79:15:2E:C2

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

dbtests.sh: #652: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED
TIMESTAMP dbtests END: Fri May 19 17:10:24 UTC 2017
Running tests for tools
TIMESTAMP tools BEGIN: Fri May 19 17:10:24 UTC 2017
tools.sh: Tools Tests with ECC ===============================
tools.sh: Exporting Alice's email cert & key - default ciphers
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #653: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                fc:27:3f:ba:6f:07:6e:30:b1:d5:6f:a8:8f:97:f1:30
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #654: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #655: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's email EC cert & key---------------
pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \
         -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #656: Exporting Alice's email EC cert & key (pk12util -o)  - PASSED
tools.sh: Importing Alice's email EC cert & key --------------
pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #657: Importing Alice's email EC cert & key (pk12util -i)  - PASSED
tools.sh: Listing Alice's pk12 EC file -----------------
pk12util -l Alice-ec.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice-ec

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                b0:f8:6f:fb:e4:2e:c5:5b:de:17:d1:32:cb:99:bd:41
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Fri May 19 17:00:38 2017
            Not After : Thu May 19 17:00:38 2067
        Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor
            nia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:23
            EC Public Key:
                PublicValue:
                    04:01:4d:dd:95:fe:5c:35:4c:25:97:25:8e:11:99:76:
                    c4:9c:8f:35:8e:92:f2:45:6a:73:97:1a:60:1c:19:04:
                    31:85:54:ad:73:56:27:b4:29:f6:d8:36:ce:4c:47:f0:
                    33:dd:3e:56:2c:fe:97:0e:e5:3a:c8:45:e4:67:b6:0f:
                    f9:58:62:01:11:0f:2a:ec:57:1c:28:87:e6:38:73:6b:
                    c3:52:4c:10:9c:37:87:7b:c2:52:73:63:ff:61:7f:da:
                    86:c4:bc:a5:ff:e2:d2:b8:55:4f:2c:96:2a:8a:1f:4a:
                    08:b5:93:60:40:6a:31:da:fb:82:18:35:a0:32:f1:89:
                    f2:21:75:3e:f5
                Curve: SECG elliptic curve secp521r1 (aka NIST P-521)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:88:02:42:00:de:3f:00:20:dd:75:dd:fd:05:a0:
        b0:41:5f:bb:61:18:c1:9e:bf:0c:8e:1b:55:d9:39:87:
        8f:a3:fc:ab:6d:cb:83:38:03:e2:43:55:7d:ff:09:d9:
        f7:65:2f:77:49:f0:9e:91:35:ef:c4:8b:5c:68:ed:6b:
        69:04:a1:16:56:30:2a:02:42:01:28:da:4f:80:39:52:
        0c:5e:f0:d0:42:bb:c0:cd:fd:d4:9a:f0:70:d0:98:cb:
        07:5c:a1:5a:d0:20:63:13:6a:41:ad:27:e5:cd:b5:9c:
        ab:57:b2:c5:84:d1:1b:04:cf:6a:92:c4:42:7d:ab:b9:
        ff:b9:66:7c:e3:e1:f7:96:61:0d:90
    Fingerprint (SHA-256):
        F6:C5:BC:99:99:31:0E:5D:A5:7E:A7:47:9F:A9:44:5E:CA:9D:54:3B:E3:68:42:93:63:D9:A4:AB:C5:CC:A6:4F
    Fingerprint (SHA1):
        9A:66:C9:51:35:8C:9C:DD:CE:9A:34:1A:A7:CF:15:13:73:CB:1A:5B

    Friendly Name: TestCA-ec

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Fri May 19 17:02:05 2017
            Not After : Thu May 19 17:02:05 2022
        Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S
            T=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:22
            EC Public Key:
                PublicValue:
                    04:5a:7e:fc:07:8b:c0:3e:13:8b:f0:5e:f6:ec:86:5a:
                    4a:c4:0e:f0:2e:d3:b3:c2:dd:4c:71:97:6b:c2:02:f9:
                    db:8b:72:c1:8c:d5:0a:c7:ef:6f:75:aa:4d:5f:98:15:
                    f4:78:a4:50:ab:43:4c:a7:b2:ce:00:6f:b3:84:a9:03:
                    77:aa:74:45:9e:a7:c1:fb:95:ca:5b:e4:2b:a1:a9:f5:
                    f3:68:fd:84:ce:d9:7d:ef:9b:66:60:6b:9a:34:88:c1:
                    88
                Curve: SECG elliptic curve secp384r1 (aka NIST P-384)
    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:87:02:42:01:5f:e9:ca:e4:96:d0:84:09:25:a2:
        62:66:2f:04:2d:89:fb:d2:5e:99:3a:f1:14:c6:f4:bf:
        0d:1a:5b:d0:89:0d:38:f8:45:4f:ee:31:cc:be:47:be:
        cd:47:73:82:e7:26:88:b9:94:21:42:61:95:45:8d:c5:
        64:5d:f3:3a:ec:2e:55:02:41:37:72:66:ab:12:d2:40:
        20:8c:c1:cc:63:45:d5:ee:33:d1:95:ac:86:28:a5:c6:
        27:78:25:9b:ca:b4:73:9d:e4:c2:d9:f4:cb:d9:ba:fc:
        61:85:3d:f5:d3:80:0a:cc:3c:8b:35:79:1b:a1:5c:8a:
        db:13:5d:f2:65:31:18:44:76:f2
    Fingerprint (SHA-256):
        47:38:75:A5:1F:D3:51:BD:BF:64:E9:0D:15:80:4C:DC:8C:F3:4F:5A:6C:8E:26:AB:5C:5E:6F:0A:EA:0F:71:E0
    Fingerprint (SHA1):
        90:04:1D:45:2D:0B:39:1C:2E:7F:E2:1A:02:9C:35:23:99:FC:79:8C

    Friendly Name: Alice-ec

tools.sh: #658: Listing Alice's pk12 EC file (pk12util -l)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #659: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                ea:d4:8d:36:1d:1d:a6:e5:04:e3:2d:32:36:33:ed:1b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #660: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #661: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #662: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                3b:15:8b:bf:73:35:0f:67:82:95:02:8c:0a:a2:30:41
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #663: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #664: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #665: Exporting with [RC2-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                31:ba:d5:fb:99:8d:94:6c:db:6f:98:4c:21:aa:06:99
            Iteration Count: 2000 (0x7d0)
tools.sh: #666: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #667: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #668: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                1f:4c:c7:44:31:01:ce:99:87:b3:98:25:c6:9d:77:90
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #669: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #670: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #671: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                a7:9c:d1:49:12:5a:c1:d0:5e:76:21:64:72:a9:bd:5c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #672: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #673: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #674: Exporting with [DES-EDE3-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                29:28:b4:31:0e:fd:b8:64:55:83:f6:7c:1f:7f:ea:66
            Iteration Count: 2000 (0x7d0)
tools.sh: #675: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #676: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #677: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        cc:ff:eb:7c:2f:bc:d7:90:c4:c7:ca:42:19:6d:e1:d6
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:6c:4b:d6:3c:e9:ce:ea:98:6d:8d:c1:b5:bb:f1:
                    ba:27
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #678: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #679: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #680: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        6e:e1:cc:a1:b8:62:fd:3a:63:8c:32:b3:70:b8:83:1b
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:a2:0d:8f:5f:38:6a:e5:d9:24:f0:77:eb:b5:57:
                    3c:01
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #681: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #682: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #683: Exporting with [AES-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        ea:e0:7d:5c:34:c0:60:eb:70:21:d3:a4:a6:e4:a9:07
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:e0:67:bd:dd:b4:cc:f9:50:ed:58:58:03:63:2d:
                    b9:ab
tools.sh: #684: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #685: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #686: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        05:2f:e1:fe:11:d6:7e:8e:35:fa:41:c8:63:ff:e3:56
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:6a:86:5c:d2:23:0e:63:4a:7b:4b:01:96:bc:5b:
                    07:7c
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #687: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #688: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #689: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        8b:d6:d0:e9:54:9e:f7:b6:35:df:04:06:d7:01:02:73
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:ba:57:44:63:1f:d0:a9:25:f0:ab:68:1a:1e:88:
                    30:46
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #690: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #691: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #692: Exporting with [AES-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        98:76:b8:ed:7a:d1:e6:bf:24:19:39:74:af:ac:e7:c1
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:8c:d7:cd:a0:58:50:54:e7:b1:a0:ff:eb:47:e7:
                    62:29
tools.sh: #693: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #694: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #695: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        e7:c7:cf:54:12:43:1b:31:9c:7b:2e:78:e7:23:75:7a
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:ef:1d:e3:18:ca:f9:3c:68:84:06:26:d6:dd:66:
                    dd:57
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #696: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #697: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #698: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        95:4b:2d:ef:c9:3a:f9:59:9b:cb:04:95:07:83:40:ad
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:41:1a:90:e1:be:94:b4:f9:f9:5b:45:3a:19:4b:
                    76:b7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #699: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #700: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #701: Exporting with [AES-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        24:ac:39:9c:af:cf:a5:6c:60:7a:cc:55:12:4c:55:94
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:db:ee:a6:a6:c8:fb:7d:b3:0c:fa:1a:5d:81:9c:
                    ff:3e
tools.sh: #702: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #703: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #704: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        d1:6a:40:2c:59:22:df:69:03:ad:8e:71:53:11:1b:af
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:f5:64:6a:db:80:63:55:7d:b9:d1:51:16:f1:b0:
                    04:a6
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #705: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #706: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #707: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        c2:81:87:a0:5b:a5:31:3b:dd:51:64:3e:66:9f:9d:5f
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:40:d7:8a:ef:35:ed:15:a3:a0:01:89:7a:37:1b:
                    c9:61
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #708: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #709: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #710: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        2b:59:15:c6:ed:c7:6b:55:8b:40:96:3e:ef:ff:62:46
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:ac:8f:37:4f:41:e7:ba:7b:79:2f:8c:7e:16:ee:
                    50:6c
tools.sh: #711: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #712: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #713: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        16:21:d6:3f:19:52:76:2a:af:95:04:a6:50:e6:2c:72
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:f9:e6:fe:e6:86:0d:12:f0:56:c7:80:ed:ca:4a:
                    fe:d7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #714: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #715: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #716: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        e7:0d:f9:20:35:25:4c:5f:0c:cf:44:ad:b7:e1:a7:d7
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:26:54:c8:27:da:f5:03:ba:72:89:86:a2:16:68:
                    f4:50
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #717: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #718: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #719: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        f6:cf:17:6d:f0:cb:9f:d9:8a:c1:eb:31:da:df:d8:0d
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:d2:56:bd:d5:f6:e7:74:2b:f6:fe:c2:54:40:58:
                    7a:04
tools.sh: #720: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #721: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #722: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        47:42:ad:5d:c9:d8:c5:b8:2c:5b:1d:c5:49:f2:b3:53
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:92:d3:ac:dc:ea:ad:0c:31:b5:83:80:18:9b:30:
                    b8:56
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #723: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #724: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #725: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        7c:ae:8c:f1:f6:73:53:db:25:44:18:ce:f0:50:dd:99
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:eb:34:49:1e:1f:66:30:eb:d7:1c:2c:69:24:27:
                    73:15
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #726: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #727: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #728: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        6a:62:47:1c:e5:79:b8:15:2e:24:82:42:b8:38:35:1e
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:49:23:63:20:f6:04:a5:6f:ff:c1:42:60:bd:71:
                    42:53
tools.sh: #729: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #730: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #731: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                13:c3:8a:30:c6:ae:06:3f:3d:34:be:02:0d:b3:99:37
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #732: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #733: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #734: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                ba:9c:a7:86:32:1e:fe:ff:b9:8c:24:c0:e2:51:1d:5c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #735: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #736: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #737: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                8b:13:2d:53:42:09:ed:24:34:a2:99:56:2e:fa:0b:75
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #738: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #739: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #740: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                0b:12:64:52:c6:13:82:60:f0:46:10:3a:73:e9:89:2a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #741: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #742: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #743: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                21:d9:81:36:25:08:12:2b:b2:72:bc:08:a7:d4:80:a1
            Iteration Count: 2000 (0x7d0)
tools.sh: #744: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #745: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #746: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                bc:13:ce:cf:1c:18:22:76:56:ac:0b:78:6f:7e:72:5c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #747: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #748: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #749: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                48:3e:01:ba:45:02:0c:d5:b4:ec:46:a9:dc:af:ae:bd
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #750: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #751: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #752: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                c7:1e:9d:a1:52:ed:c5:1b:49:e2:78:7d:b6:0f:71:f0
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #753: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #754: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #755: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                c3:d5:db:1b:a0:c7:79:cb:f0:b0:73:1d:8b:75:dd:a6
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #756: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #757: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #758: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                c6:e9:2f:23:6f:eb:f5:e3:57:81:08:65:cd:49:c6:14
            Iteration Count: 2000 (0x7d0)
tools.sh: #759: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #760: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #761: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                b8:22:a3:5c:90:cb:1a:f2:ac:29:ac:45:ed:4e:fb:5b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #762: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #763: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #764: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                55:7f:2e:02:d7:27:be:95:73:8c:7e:4e:3e:18:c1:db
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #765: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #766: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #767: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                58:8b:ba:bd:3c:3a:53:54:b7:ef:55:95:cc:0d:c2:e4
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #768: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #769: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #770: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                35:5d:c1:c9:42:5f:4f:3e:d2:52:40:4d:1b:01:aa:6c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #771: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #772: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #773: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                21:7c:82:f5:73:23:9c:32:f3:58:ee:ae:77:df:07:52
            Iteration Count: 2000 (0x7d0)
tools.sh: #774: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #775: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #776: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                2d:5c:b7:c6:e8:ca:a9:db:e5:2e:58:71:b3:77:46:e6
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #777: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #778: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #779: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                c3:1b:f7:d8:98:da:81:7f:b8:1c:7c:e9:73:7a:b1:da
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #780: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #781: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #782: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                39:fa:91:6c:0d:be:82:55:3e:1e:92:37:41:5b:72:1b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #783: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #784: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #785: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                49:dc:e1:57:19:71:24:77:76:9c:68:5c:f3:d4:30:ab
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #786: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #787: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:null]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #788: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                d1:92:f7:1e:75:da:72:69:8d:03:8d:40:4f:4f:94:66
            Iteration Count: 2000 (0x7d0)
tools.sh: #789: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #790: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #791: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                45:20:b0:74:c7:96:4b:6f:6e:6f:e1:d4:4e:6d:79:9a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #792: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #793: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #794: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                00:4e:36:72:d9:91:75:05:8b:17:79:d3:c5:84:d8:7b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #795: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #796: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #797: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                8c:73:63:30:1a:5d:86:c1:47:6a:2b:03:f5:e0:4b:37
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #798: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #799: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #800: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                2d:02:af:8a:7c:a4:13:23:20:3e:90:d8:7d:86:59:2b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #801: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #802: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #803: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                83:e4:f5:8d:94:05:f4:22:12:81:f7:71:d5:cb:e4:09
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #804: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #805: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #806: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                b2:5b:2d:6e:42:41:a5:a9:7c:58:08:8d:53:61:51:79
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #807: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #808: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #809: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                47:f4:9f:70:96:e2:fe:51:8f:4d:ff:ee:90:32:52:a9
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #810: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #811: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #812: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                5b:18:6d:f3:5e:f1:69:ae:97:ef:8f:86:fb:d1:f9:5e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #813: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #814: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #815: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                36:d7:74:62:3c:d7:72:b1:3d:ed:5b:cc:a4:61:7d:a2
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #816: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #817: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #818: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                50:56:95:70:ea:7c:d0:7d:93:c5:4d:8d:59:fc:b1:00
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 16:59:41 2017
            Not After : Thu May 19 16:59:41 2067
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:06:68:53:4e:1b:2a:c9:91:6d:76:c9:e2:b2:69:5f:
                    cb:49:d0:75:10:78:56:ee:d1:22:5c:25:3a:6e:b3:cc:
                    fa:38:ed:cd:77:29:77:c2:2a:86:0e:d4:68:60:c6:c7:
                    54:a8:21:70:64:e2:f7:c8:88:4e:f8:cb:e3:86:a1:a2:
                    7a:bc:c8:8b:c7:81:c6:7b:d5:ed:5f:37:ed:28:08:97:
                    9c:33:fe:3e:81:a8:c9:28:67:5d:a6:08:1f:f4:a5:53:
                    dd:66:cb:c1:30:d1:ba:88:c9:5f:e4:9c:d2:03:cb:c0:
                    a8:ba:56:9b:c2:53:95:b2:d0:5b:38:da:72:ae:f3:61:
                    43:aa:4a:65:78:5d:ac:b5:67:99:45:99:47:ea:a5:2c:
                    b6:89:16:57:dd:ad:91:e4:bb:92:2a:7a:4b:d6:4c:54:
                    b5:17:e9:b0:97:dc:e0:19:37:e9:b7:2a:10:37:e3:68:
                    74:36:0f:5b:f9:b8:33:77:29:f1:a4:3e:41:73:55:e5:
                    e4:4a:e6:0e:3a:48:4d:5b:1f:ae:a1:98:30:53:bf:bc:
                    f3:8f:6f:20:fa:1c:ce:6a:f4:d2:e6:c5:bb:db:e8:10:
                    0e:4a:6c:d9:2b:cb:9c:ec:d1:a1:28:60:4e:89:66:0f:
                    02:7c:06:54:a3:08:25:40:7d:95:32:fa:71:25:3d:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        49:cf:f3:ab:5b:6d:c1:76:73:1c:c4:21:38:4f:e9:74:
        a7:45:77:63:ca:5c:50:b4:5c:6c:e4:b5:9a:26:9b:cb:
        ce:82:ba:c5:89:de:ff:51:fe:69:16:8d:3f:dc:b5:27:
        85:f1:ee:24:f9:cb:99:8c:37:5a:27:81:e0:04:fa:81:
        5f:81:cf:39:3e:5c:3b:71:27:95:5f:9a:f2:77:00:13:
        05:4e:40:28:bb:1a:97:5a:89:16:cd:73:d1:63:94:31:
        c0:2a:c8:e0:15:2f:47:d2:94:88:7f:93:9b:cb:bf:86:
        54:d9:76:4f:f1:d7:6d:15:10:35:f3:74:a2:42:2f:6e:
        fb:da:fe:c0:b3:23:5c:1c:c5:2e:e0:25:b0:62:3f:26:
        35:f2:a2:71:f1:8a:45:70:e8:c6:10:2b:eb:72:6f:c4:
        f8:9e:66:8c:13:7c:e9:0b:ef:c8:f9:16:7a:4b:a1:df:
        9e:2b:1f:5f:75:35:77:76:cd:22:9b:f7:b9:83:03:4c:
        da:72:4f:bd:8e:59:7f:ee:a7:95:57:ab:17:8c:4e:c0:
        d4:31:18:48:d0:2d:0c:70:7e:4b:c9:17:c2:66:72:b7:
        13:eb:51:0b:e6:1f:83:f3:cc:fe:f6:42:59:99:f4:a8:
        eb:e0:86:7c:8e:14:f6:2a:45:81:37:6e:58:9d:f5:6b
    Fingerprint (SHA-256):
        06:2B:2D:32:76:CE:76:2F:C7:74:4B:11:B8:84:72:79:27:C4:37:92:AF:11:49:BB:1D:26:FE:8B:0E:66:97:1E
    Fingerprint (SHA1):
        4A:7C:62:19:4F:BC:A9:91:E4:AA:C9:21:D5:D1:26:27:37:2C:01:AD

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:02:03 2017
            Not After : Thu May 19 17:02:03 2022
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:62:e5:2f:1b:8f:75:de:44:ba:db:d3:d0:6a:4d:d4:
                    6f:48:c3:e2:54:54:c4:1f:bd:dd:be:4e:66:4f:cd:7b:
                    a7:14:72:ba:ae:1d:f2:71:4b:e9:69:a5:c4:30:7a:2c:
                    f5:a1:42:10:a2:22:67:35:79:d8:d6:19:0c:f7:0b:79:
                    0a:83:cc:6a:a5:4d:32:a0:d6:99:7d:b3:44:bb:41:04:
                    02:03:75:1f:a1:5f:41:cb:18:26:79:d1:ea:b8:0b:f7:
                    0c:21:d7:b8:a3:32:8f:6f:88:4a:73:05:b7:df:e0:e5:
                    3a:ac:06:c2:08:5b:c0:55:d1:92:5f:ea:66:c6:d4:f7:
                    1e:6e:c5:dd:66:d4:14:a9:95:8a:41:f9:86:28:1d:38:
                    f5:e6:b2:ea:a1:5b:90:3f:5b:87:fb:42:8b:fd:f9:b4:
                    e6:00:b4:76:20:37:02:39:ce:4d:61:6a:2b:d6:9f:1e:
                    66:5e:8e:5b:cd:b8:5c:83:df:64:0a:88:5c:95:57:0d:
                    6a:e4:19:0a:4b:f8:a3:06:65:54:52:4c:a7:26:f6:8e:
                    97:62:8a:19:a3:e8:85:50:c8:a2:2d:32:31:9b:2b:1d:
                    8d:91:a0:4f:e2:70:bf:b1:06:ed:51:49:94:1f:71:2a:
                    d1:49:0e:eb:05:8e:0c:50:04:1c:0e:5a:72:bd:d0:ab
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:19:75:1d:4b:fb:b4:e8:45:42:20:26:98:3f:29:e5:
        df:a5:57:25:5f:e1:7f:3b:88:09:e9:86:ef:0b:07:f0:
        4d:a1:27:0d:3c:42:c9:57:a3:84:d2:2c:79:c5:96:d7:
        3f:d0:f7:d9:d6:86:e0:de:ef:0a:a5:1a:31:fd:8f:43:
        6e:fc:91:b4:7b:b6:51:37:7f:b8:1e:b6:4d:8e:d3:be:
        3c:c8:6c:43:92:70:ff:99:54:c4:d7:fd:8c:c4:fe:19:
        43:e2:12:3c:19:18:63:8d:dd:52:f9:9a:a0:84:6a:da:
        c1:10:99:a0:6e:f6:8e:78:02:1d:95:ea:d9:6a:e9:0f:
        91:7a:59:e9:a7:65:7e:e0:9d:99:e9:11:1f:3d:2f:24:
        93:b5:ea:d1:82:62:ee:b6:81:59:e2:06:86:c5:b3:e7:
        6f:cd:04:6e:2f:67:ae:a3:98:67:55:38:39:03:61:1d:
        33:35:26:3a:24:c2:b8:ab:f7:97:4b:03:78:89:92:70:
        da:ef:41:a6:3d:55:02:3c:3d:f9:e4:8f:d3:2d:14:dd:
        2a:7d:dd:a6:11:6b:c0:a7:45:0c:bd:b8:1d:4d:bb:ce:
        59:c1:86:8e:3b:b6:5c:eb:fd:29:c1:e3:44:14:82:da:
        65:ca:b7:0c:bb:f5:4d:ab:de:c0:f5:d0:af:49:62:ae
    Fingerprint (SHA-256):
        D1:98:AD:10:0D:12:1D:FD:D1:E5:C2:D0:A0:03:51:78:92:16:CF:ED:14:5A:6E:B8:80:88:87:5B:BF:D5:EF:E2
    Fingerprint (SHA1):
        FB:FA:88:B1:54:96:F6:90:C9:0D:8E:C0:96:38:08:F8:95:1A:B0:F1

    Friendly Name: Alice

tools.sh: #819: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #820: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c null
pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm.
tools.sh: #821: Exporting with [null:default] (pk12util -o)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #822: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Create objsign cert -------------------------------
signtool -G "objectsigner" -d ../tools/signdir -p "nss"

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit the browser before continuing this operation. Enter 
"y" to continue, or anything else to abort: 

Enter certificate information.  All fields are optional. Acceptable
characters are numbers, letters, spaces, and apostrophes.
certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair
certificate request generated
certificate has been signed
certificate "objsigner" added to database
Exported certificate to x509.raw and x509.cacert.
tools.sh: #823: Create objsign cert (signtool -G)  - PASSED
tools.sh: Signing a jar of files ----------------------------
signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> sign.html
adding ../tools/html/sign.html to nojs.jar...(deflated 26%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.jar...(deflated 28%)
Generating zigbert.sf file..
adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%)
adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%)
tree "../tools/html" signed successfully
tools.sh: #824: Signing a jar of files (signtool -Z)  - PASSED
tools.sh: Listing signed files in jar ----------------------
signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner
archive "nojs.jar" has passed crypto verification.
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match
found a RSA signature file: META-INF/zigbert.rsa

          status   path
    ------------   -------------------
        verified   sign.html
        verified   signjs.html
tools.sh: #825: Listing signed files in jar (signtool -v)  - PASSED
tools.sh: Show who signed jar ------------------------------
signtool -w nojs.jar -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #826: Show who signed jar (signtool -w)  - PASSED
tools.sh: Signing a xpi of files ----------------------------
signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> sign.html
--> signjs.html
Generating zigbert.sf file..
Creating XPI Compatible Archive 
adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%)
--> sign.html
adding ../tools/html/sign.html to nojs.xpi...(deflated 26%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%)
adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%)
tree "../tools/html" signed successfully
tools.sh: #827: Signing a xpi of files (signtool -Z -X)  - PASSED
tools.sh: Listing signed files in xpi ----------------------
signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner
archive "nojs.xpi" has passed crypto verification.
found a RSA signature file: META-INF/zigbert.rsa
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match

          status   path
    ------------   -------------------
        verified   sign.html
        verified   signjs.html
tools.sh: #828: Listing signed files in xpi (signtool -v)  - PASSED
tools.sh: Show who signed xpi ------------------------------
signtool -w nojs.xpi -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #829: Show who signed xpi (signtool -w)  - PASSED
TIMESTAMP tools END: Fri May 19 17:10:49 UTC 2017
Running tests for fips
TIMESTAMP fips BEGIN: Fri May 19 17:10:49 UTC 2017
fips.sh: FIPS 140 Compliance Tests ===============================
fips.sh: Verify this module is in FIPS mode  -----------------
modutil -dbdir ../fips -list

Listing of PKCS #11 Modules
-----------------------------------------------------------
  1. NSS Internal FIPS PKCS #11 Module
	 slots: 1 slot attached
	status: loaded

	 slot: NSS FIPS 140-2 User Private Key Services
	token: NSS FIPS 140-2 Certificate DB

  2. RootCerts
	library name: /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so
	 slots: 1 slot attached
	status: loaded

	 slot: NSS Builtin Objects
	token: Builtin Object Token
-----------------------------------------------------------
FIPS mode enabled.
fips.sh: #830: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #831: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys -------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      4cdfb381df5a91f4b23f7ca6b75de8b2bdb261dd   NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate
fips.sh: #832: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Attempt to list FIPS module keys with incorrect password
certutil -d ../fips -K -f /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests.fipsbadpw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect.
fips.sh: #833: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED
certutil -K returned 255
fips.sh: Validate the certificate --------------------------
certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw
certutil: certificate is valid
fips.sh: #834: Validate the certificate (certutil -V -e) . - PASSED
fips.sh: Export the certificate and key as a PKCS#12 file --
pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 EXPORT SUCCESSFUL
fips.sh: #835: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED
fips.sh: Export the certificate as a DER-encoded file ------
certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt
fips.sh: #836: Export the certificate as a DER (certutil -L -r) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #837: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Delete the certificate and key from the FIPS module
certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw
fips.sh: #838: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #839: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys.
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
certutil: no keys found
fips.sh: #840: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #841: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #842: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      4cdfb381df5a91f4b23f7ca6b75de8b2bdb261dd   FIPS_PUB_140_Test_Certificate
fips.sh: #843: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Delete the certificate from the FIPS module
certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate
fips.sh: #844: Delete the certificate from the FIPS module (certutil -D) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #845: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #846: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #847: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      4cdfb381df5a91f4b23f7ca6b75de8b2bdb261dd   FIPS_PUB_140_Test_Certificate
fips.sh: #848: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Run PK11MODE in FIPSMODE  -----------------
pk11mode -d ../fips -p fips- -f ../tests.fipspw
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
**** Total number of TESTS ran in FIPS MODE is 106. ****
**** ALL TESTS PASSED ****
fips.sh: #849: Run PK11MODE in FIPS mode (pk11mode) . - PASSED
fips.sh: Run PK11MODE in Non FIPSMODE  -----------------
pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
**** Total number of TESTS ran in NON FIPS MODE is 104. ****
**** ALL TESTS PASSED ****
fips.sh: #850: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED
mkdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libcrmf.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libdbm.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libfreebl.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libfreebl3.chk /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libfreebl3.so /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libfreeblpriv3.chk /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libfreeblpriv3.so /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libgtest.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libgtest1.so /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libjar.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnss3.so /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssb.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssckfw.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssdbm.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssdbm3.chk /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssdbm3.so /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssutil.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssutil3.so /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libsectool.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libsmime3.so /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libsoftokn3.chk /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libsoftokn3.so /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libssl3.so /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle
fips.sh: Detect mangled softoken--------------------------
mangling /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle/libsoftokn3.so
mangle -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle/libsoftokn3.so -o -8 -b 5
Changing byte 0x000f5577 (1004919): from 5f (95) to 7f (127)
LD_LIBRARY_PATH=/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/fips/mangle dbtest -r -d ../fips
fips.sh: #851: Init NSS with a corrupted library (dbtest -r) . - PASSED
fips.sh done
TIMESTAMP fips END: Fri May 19 17:12:02 UTC 2017
Running tests for sdr
TIMESTAMP sdr BEGIN: Fri May 19 17:12:02 UTC 2017
sdr.sh: SDR Tests ===============================
sdr.sh: Creating an SDR key/SDR Encrypt - Value 1
sdrtest -d . -o /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests.v1.8458 -t "Test1"
sdr.sh: #852: Creating SDR Key/Encrypt - Value 1  - PASSED
sdr.sh: SDR Encrypt - Value 2
sdrtest -d . -o /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests.v2.8458 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #853: Encrypt - Value 2  - PASSED
sdr.sh: SDR Encrypt - Value 3
sdrtest -d . -o /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests.v3.8458 -t "1234567"
sdr.sh: #854: Encrypt - Value 3  - PASSED
sdr.sh: SDR Decrypt - Value 1
sdrtest -d . -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests.v1.8458 -t "Test1"
sdr.sh: #855: Decrypt - Value 1  - PASSED
sdr.sh: SDR Decrypt - Value 2
sdrtest -d . -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests.v2.8458 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #856: Decrypt - Value 2  - PASSED
sdr.sh: SDR Decrypt - Value 3
sdrtest -d . -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests.v3.8458 -t "1234567"
sdr.sh: #857: Decrypt - Value 3  - PASSED
TIMESTAMP sdr END: Fri May 19 17:12:02 UTC 2017
Running tests for crmf
TIMESTAMP crmf BEGIN: Fri May 19 17:12:02 UTC 2017
crmf.sh: CRMF/CMMF Tests ===============================
crmf.sh: CRMF/CMMF Tests ------------------------------
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode

crmftest v1.0
Generating CRMF request
Decoding CRMF request
crmftest: Processing cert request 0
crmftest: Processing cert request 1
Exiting successfully!!!

crmf.sh: #858: CRMF test . - PASSED
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf

crmftest v1.0
Doing CMMF Stuff
Exiting successfully!!!

crmf.sh: #859: CMMF test . - PASSED
TIMESTAMP crmf END: Fri May 19 17:12:03 UTC 2017
Running tests for smime
TIMESTAMP smime BEGIN: Fri May 19 17:12:03 UTC 2017
smime.sh: S/MIME Tests with ECC ===============================
smime.sh: Signing Detached Message {SHA1} ------------------
cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1
smime.sh: #860: Create Detached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #861: Verifying Alice's Detached Signature (SHA1) . - PASSED
smime.sh: Signing Attached Message (SHA1) ------------------
cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1
smime.sh: #862: Create Attached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1
smime.sh: #863: Decode Alice's Attached Signature (SHA1) . - PASSED
diff alice.txt alice.data.SHA1
smime.sh: #864: Compare Attached Signed Data and Original (SHA1) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------
cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1
smime.sh: #865: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #866: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------
cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1
smime.sh: #867: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1
smime.sh: #868: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED
diff alice.txt alice-ec.data.SHA1
smime.sh: #869: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Detached Message {SHA256} ------------------
cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256
smime.sh: #870: Create Detached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #871: Verifying Alice's Detached Signature (SHA256) . - PASSED
smime.sh: Signing Attached Message (SHA256) ------------------
cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256
smime.sh: #872: Create Attached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256
smime.sh: #873: Decode Alice's Attached Signature (SHA256) . - PASSED
diff alice.txt alice.data.SHA256
smime.sh: #874: Compare Attached Signed Data and Original (SHA256) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------
cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256
smime.sh: #875: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #876: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------
cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256
smime.sh: #877: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256
smime.sh: #878: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED
diff alice.txt alice-ec.data.SHA256
smime.sh: #879: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Detached Message {SHA384} ------------------
cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384
smime.sh: #880: Create Detached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #881: Verifying Alice's Detached Signature (SHA384) . - PASSED
smime.sh: Signing Attached Message (SHA384) ------------------
cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384
smime.sh: #882: Create Attached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384
smime.sh: #883: Decode Alice's Attached Signature (SHA384) . - PASSED
diff alice.txt alice.data.SHA384
smime.sh: #884: Compare Attached Signed Data and Original (SHA384) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------
cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384
smime.sh: #885: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #886: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------
cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384
smime.sh: #887: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384
smime.sh: #888: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED
diff alice.txt alice-ec.data.SHA384
smime.sh: #889: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Detached Message {SHA512} ------------------
cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512
smime.sh: #890: Create Detached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #891: Verifying Alice's Detached Signature (SHA512) . - PASSED
smime.sh: Signing Attached Message (SHA512) ------------------
cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512
smime.sh: #892: Create Attached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512
smime.sh: #893: Decode Alice's Attached Signature (SHA512) . - PASSED
diff alice.txt alice.data.SHA512
smime.sh: #894: Compare Attached Signed Data and Original (SHA512) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------
cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512
smime.sh: #895: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #896: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------
cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512
smime.sh: #897: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512
smime.sh: #898: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED
diff alice.txt alice-ec.data.SHA512
smime.sh: #899: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED
smime.sh: Enveloped Data Tests ------------------------------
cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \
        -o alice.env
smime.sh: #900: Create Enveloped Data Alice . - PASSED
cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1
smime.sh: #901: Decode Enveloped Data Alice . - PASSED
diff alice.txt alice.data1
smime.sh: #902: Compare Decoded Enveloped Data and Original . - PASSED
smime.sh: Testing multiple recipients ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \
        -r bob@bogus.com,dave@bogus.com
smime.sh: #903: Create Multiple Recipients Enveloped Data Alice . - PASSED
smime.sh: Testing multiple email addrs ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \
        -r eve@bogus.net
smime.sh: #904: Encrypt to a Multiple Email cert . - PASSED
cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2
smime.sh: #905: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED
cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3
smime.sh: #906: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED
cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4
smime.sh: #907: Decrypt with a Multiple Email cert . - PASSED
smime.sh: #908: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED
smime.sh: #909: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED
smime.sh: #910: Compare Decoded with Multiple Email cert . - PASSED
smime.sh: Sending CERTS-ONLY Message ------------------------------
cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \
        -d ../alicedir > co.der
smime.sh: #911: Create Certs-Only Alice . - PASSED
cmsutil -D -i co.der -d ../bobdir
smime.sh: #912: Verify Certs-Only by CA . - PASSED
smime.sh: Encrypted-Data Message ---------------------------------
cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \
        -r "bob@bogus.com" > alice.enc
smime.sh: #913: Create Encrypted-Data . - PASSED
cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \
        -o alice.data2
smime.sh: #914: Decode Encrypted-Data . - PASSED
smime.sh: #915: Compare Decoded and Original Data . - PASSED
smime.sh: p7 util Data Tests ------------------------------
p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env
smime.sh: #916: Creating envelope for user Alice . - PASSED
p7content -d ../alicedir -i alice.env -o alice_p7.data
smime.sh: #917: Verifying file delivered to user Alice . - PASSED
diff alice.txt alice_p7.data.sed
smime.sh: #918: Compare Decoded Enveloped Data and Original . - PASSED
p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e
smime.sh: #919: Signing file for user Alice . - PASSED
p7verify -d ../alicedir -c alice.txt -s alice.sig
Signature is valid.
smime.sh: #920: Verifying file delivered to user Alice . - PASSED
TIMESTAMP smime END: Fri May 19 17:12:13 UTC 2017
Running tests for ssl
TIMESTAMP ssl BEGIN: Fri May 19 17:12:13 UTC 2017
ssl.sh: SSL tests ===============================
ssl.sh: CRL SSL Client Tests   - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:12:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29635 >/dev/null 2>/dev/null
selfserv with PID 29635 found at Fri May 19 17:12:14 UTC 2017
selfserv with PID 29635 started at Fri May 19 17:12:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #921: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29635 at Fri May 19 17:12:15 UTC 2017
kill -USR1 29635
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29635 killed at Fri May 19 17:12:15 UTC 2017
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:12:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29691 >/dev/null 2>/dev/null
selfserv with PID 29691 found at Fri May 19 17:12:15 UTC 2017
selfserv with PID 29691 started at Fri May 19 17:12:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #922: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29691 at Fri May 19 17:12:16 UTC 2017
kill -USR1 29691
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29691 killed at Fri May 19 17:12:16 UTC 2017
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:12:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29749 >/dev/null 2>/dev/null
selfserv with PID 29749 found at Fri May 19 17:12:16 UTC 2017
selfserv with PID 29749 started at Fri May 19 17:12:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #923: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29749 at Fri May 19 17:12:17 UTC 2017
kill -USR1 29749
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29749 killed at Fri May 19 17:12:17 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Fri May 19 17:12:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29817 >/dev/null 2>/dev/null
selfserv with PID 29817 found at Fri May 19 17:12:17 UTC 2017
selfserv with PID 29817 started at Fri May 19 17:12:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #924: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29817 at Fri May 19 17:12:18 UTC 2017
kill -USR1 29817
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29817 killed at Fri May 19 17:12:18 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Fri May 19 17:12:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29873 >/dev/null 2>/dev/null
selfserv with PID 29873 found at Fri May 19 17:12:19 UTC 2017
selfserv with PID 29873 started at Fri May 19 17:12:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #925: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29873 at Fri May 19 17:12:20 UTC 2017
kill -USR1 29873
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29873 killed at Fri May 19 17:12:20 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Fri May 19 17:12:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29929 >/dev/null 2>/dev/null
selfserv with PID 29929 found at Fri May 19 17:12:20 UTC 2017
selfserv with PID 29929 started at Fri May 19 17:12:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #926: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29929 at Fri May 19 17:12:21 UTC 2017
kill -USR1 29929
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29929 killed at Fri May 19 17:12:21 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Fri May 19 17:12:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30001 >/dev/null 2>/dev/null
selfserv with PID 30001 found at Fri May 19 17:12:21 UTC 2017
selfserv with PID 30001 started at Fri May 19 17:12:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #927: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30001 at Fri May 19 17:12:22 UTC 2017
kill -USR1 30001
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30001 killed at Fri May 19 17:12:22 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Fri May 19 17:12:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30057 >/dev/null 2>/dev/null
selfserv with PID 30057 found at Fri May 19 17:12:22 UTC 2017
selfserv with PID 30057 started at Fri May 19 17:12:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #928: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30057 at Fri May 19 17:12:24 UTC 2017
kill -USR1 30057
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30057 killed at Fri May 19 17:12:24 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Fri May 19 17:12:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30113 >/dev/null 2>/dev/null
selfserv with PID 30113 found at Fri May 19 17:12:24 UTC 2017
selfserv with PID 30113 started at Fri May 19 17:12:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #929: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30113 at Fri May 19 17:12:25 UTC 2017
kill -USR1 30113
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30113 killed at Fri May 19 17:12:25 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:12:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30181 >/dev/null 2>/dev/null
selfserv with PID 30181 found at Fri May 19 17:12:25 UTC 2017
selfserv with PID 30181 started at Fri May 19 17:12:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #930: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30181 at Fri May 19 17:12:27 UTC 2017
kill -USR1 30181
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30181 killed at Fri May 19 17:12:27 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:12:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30238 >/dev/null 2>/dev/null
selfserv with PID 30238 found at Fri May 19 17:12:27 UTC 2017
selfserv with PID 30238 started at Fri May 19 17:12:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #931: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30238 at Fri May 19 17:12:28 UTC 2017
kill -USR1 30238
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30238 killed at Fri May 19 17:12:28 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:12:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30294 >/dev/null 2>/dev/null
selfserv with PID 30294 found at Fri May 19 17:12:28 UTC 2017
selfserv with PID 30294 started at Fri May 19 17:12:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #932: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30294 at Fri May 19 17:12:29 UTC 2017
kill -USR1 30294
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30294 killed at Fri May 19 17:12:29 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Fri May 19 17:12:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30362 >/dev/null 2>/dev/null
selfserv with PID 30362 found at Fri May 19 17:12:29 UTC 2017
selfserv with PID 30362 started at Fri May 19 17:12:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #933: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30362 at Fri May 19 17:12:30 UTC 2017
kill -USR1 30362
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30362 killed at Fri May 19 17:12:30 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Fri May 19 17:12:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30418 >/dev/null 2>/dev/null
selfserv with PID 30418 found at Fri May 19 17:12:30 UTC 2017
selfserv with PID 30418 started at Fri May 19 17:12:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #934: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30418 at Fri May 19 17:12:31 UTC 2017
kill -USR1 30418
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30418 killed at Fri May 19 17:12:31 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Fri May 19 17:12:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30474 >/dev/null 2>/dev/null
selfserv with PID 30474 found at Fri May 19 17:12:31 UTC 2017
selfserv with PID 30474 started at Fri May 19 17:12:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #935: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30474 at Fri May 19 17:12:32 UTC 2017
kill -USR1 30474
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30474 killed at Fri May 19 17:12:32 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Fri May 19 17:12:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30542 >/dev/null 2>/dev/null
selfserv with PID 30542 found at Fri May 19 17:12:33 UTC 2017
selfserv with PID 30542 started at Fri May 19 17:12:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #936: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30542 at Fri May 19 17:12:34 UTC 2017
kill -USR1 30542
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30542 killed at Fri May 19 17:12:34 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Fri May 19 17:12:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30598 >/dev/null 2>/dev/null
selfserv with PID 30598 found at Fri May 19 17:12:34 UTC 2017
selfserv with PID 30598 started at Fri May 19 17:12:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #937: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30598 at Fri May 19 17:12:35 UTC 2017
kill -USR1 30598
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30598 killed at Fri May 19 17:12:35 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Fri May 19 17:12:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30654 >/dev/null 2>/dev/null
selfserv with PID 30654 found at Fri May 19 17:12:35 UTC 2017
selfserv with PID 30654 started at Fri May 19 17:12:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #938: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30654 at Fri May 19 17:12:36 UTC 2017
kill -USR1 30654
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30654 killed at Fri May 19 17:12:36 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:12:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30722 >/dev/null 2>/dev/null
selfserv with PID 30722 found at Fri May 19 17:12:37 UTC 2017
selfserv with PID 30722 started at Fri May 19 17:12:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #939: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30722 at Fri May 19 17:12:37 UTC 2017
kill -USR1 30722
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30722 killed at Fri May 19 17:12:38 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:12:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30778 >/dev/null 2>/dev/null
selfserv with PID 30778 found at Fri May 19 17:12:38 UTC 2017
selfserv with PID 30778 started at Fri May 19 17:12:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #940: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30778 at Fri May 19 17:12:39 UTC 2017
kill -USR1 30778
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30778 killed at Fri May 19 17:12:39 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:12:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30834 >/dev/null 2>/dev/null
selfserv with PID 30834 found at Fri May 19 17:12:39 UTC 2017
selfserv with PID 30834 started at Fri May 19 17:12:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #941: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30834 at Fri May 19 17:12:40 UTC 2017
kill -USR1 30834
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30834 killed at Fri May 19 17:12:40 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Fri May 19 17:12:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30902 >/dev/null 2>/dev/null
selfserv with PID 30902 found at Fri May 19 17:12:40 UTC 2017
selfserv with PID 30902 started at Fri May 19 17:12:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #942: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30902 at Fri May 19 17:12:41 UTC 2017
kill -USR1 30902
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30902 killed at Fri May 19 17:12:41 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Fri May 19 17:12:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30958 >/dev/null 2>/dev/null
selfserv with PID 30958 found at Fri May 19 17:12:41 UTC 2017
selfserv with PID 30958 started at Fri May 19 17:12:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #943: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30958 at Fri May 19 17:12:42 UTC 2017
kill -USR1 30958
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30958 killed at Fri May 19 17:12:42 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Fri May 19 17:12:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31014 >/dev/null 2>/dev/null
selfserv with PID 31014 found at Fri May 19 17:12:42 UTC 2017
selfserv with PID 31014 started at Fri May 19 17:12:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #944: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31014 at Fri May 19 17:12:43 UTC 2017
kill -USR1 31014
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31014 killed at Fri May 19 17:12:43 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Fri May 19 17:12:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31082 >/dev/null 2>/dev/null
selfserv with PID 31082 found at Fri May 19 17:12:43 UTC 2017
selfserv with PID 31082 started at Fri May 19 17:12:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #945: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31082 at Fri May 19 17:12:44 UTC 2017
kill -USR1 31082
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31082 killed at Fri May 19 17:12:44 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Fri May 19 17:12:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31138 >/dev/null 2>/dev/null
selfserv with PID 31138 found at Fri May 19 17:12:44 UTC 2017
selfserv with PID 31138 started at Fri May 19 17:12:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #946: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31138 at Fri May 19 17:12:45 UTC 2017
kill -USR1 31138
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31138 killed at Fri May 19 17:12:45 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Fri May 19 17:12:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31194 >/dev/null 2>/dev/null
selfserv with PID 31194 found at Fri May 19 17:12:46 UTC 2017
selfserv with PID 31194 started at Fri May 19 17:12:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #947: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31194 at Fri May 19 17:12:47 UTC 2017
kill -USR1 31194
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31194 killed at Fri May 19 17:12:47 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:12:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31262 >/dev/null 2>/dev/null
selfserv with PID 31262 found at Fri May 19 17:12:47 UTC 2017
selfserv with PID 31262 started at Fri May 19 17:12:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #948: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31262 at Fri May 19 17:12:48 UTC 2017
kill -USR1 31262
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31262 killed at Fri May 19 17:12:48 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:12:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31318 >/dev/null 2>/dev/null
selfserv with PID 31318 found at Fri May 19 17:12:48 UTC 2017
selfserv with PID 31318 started at Fri May 19 17:12:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #949: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31318 at Fri May 19 17:12:49 UTC 2017
kill -USR1 31318
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31318 killed at Fri May 19 17:12:49 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:12:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31374 >/dev/null 2>/dev/null
selfserv with PID 31374 found at Fri May 19 17:12:49 UTC 2017
selfserv with PID 31374 started at Fri May 19 17:12:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #950: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31374 at Fri May 19 17:12:50 UTC 2017
kill -USR1 31374
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31374 killed at Fri May 19 17:12:50 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Fri May 19 17:12:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Fri May 19 17:12:50 UTC 2017
selfserv with PID 31442 started at Fri May 19 17:12:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #951: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31442 at Fri May 19 17:12:51 UTC 2017
kill -USR1 31442
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31442 killed at Fri May 19 17:12:51 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Fri May 19 17:12:51 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31498 >/dev/null 2>/dev/null
selfserv with PID 31498 found at Fri May 19 17:12:51 UTC 2017
selfserv with PID 31498 started at Fri May 19 17:12:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #952: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31498 at Fri May 19 17:12:52 UTC 2017
kill -USR1 31498
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31498 killed at Fri May 19 17:12:52 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Fri May 19 17:12:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31556 >/dev/null 2>/dev/null
selfserv with PID 31556 found at Fri May 19 17:12:52 UTC 2017
selfserv with PID 31556 started at Fri May 19 17:12:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #953: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31556 at Fri May 19 17:12:53 UTC 2017
kill -USR1 31556
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31556 killed at Fri May 19 17:12:53 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Fri May 19 17:12:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31624 >/dev/null 2>/dev/null
selfserv with PID 31624 found at Fri May 19 17:12:53 UTC 2017
selfserv with PID 31624 started at Fri May 19 17:12:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #954: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31624 at Fri May 19 17:12:54 UTC 2017
kill -USR1 31624
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31624 killed at Fri May 19 17:12:54 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Fri May 19 17:12:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31680 >/dev/null 2>/dev/null
selfserv with PID 31680 found at Fri May 19 17:12:55 UTC 2017
selfserv with PID 31680 started at Fri May 19 17:12:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #955: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31680 at Fri May 19 17:12:56 UTC 2017
kill -USR1 31680
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31680 killed at Fri May 19 17:12:56 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Fri May 19 17:12:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31736 >/dev/null 2>/dev/null
selfserv with PID 31736 found at Fri May 19 17:12:56 UTC 2017
selfserv with PID 31736 started at Fri May 19 17:12:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #956: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31736 at Fri May 19 17:12:57 UTC 2017
kill -USR1 31736
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31736 killed at Fri May 19 17:12:57 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:12:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31804 >/dev/null 2>/dev/null
selfserv with PID 31804 found at Fri May 19 17:12:57 UTC 2017
selfserv with PID 31804 started at Fri May 19 17:12:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #957: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31804 at Fri May 19 17:12:58 UTC 2017
kill -USR1 31804
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31804 killed at Fri May 19 17:12:58 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:12:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:12:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31860 >/dev/null 2>/dev/null
selfserv with PID 31860 found at Fri May 19 17:12:59 UTC 2017
selfserv with PID 31860 started at Fri May 19 17:12:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #958: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31860 at Fri May 19 17:13:00 UTC 2017
kill -USR1 31860
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31860 killed at Fri May 19 17:13:00 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:13:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31916 >/dev/null 2>/dev/null
selfserv with PID 31916 found at Fri May 19 17:13:00 UTC 2017
selfserv with PID 31916 started at Fri May 19 17:13:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #959: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31916 at Fri May 19 17:13:01 UTC 2017
kill -USR1 31916
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31916 killed at Fri May 19 17:13:01 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:13:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31984 >/dev/null 2>/dev/null
selfserv with PID 31984 found at Fri May 19 17:13:01 UTC 2017
selfserv with PID 31984 started at Fri May 19 17:13:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #960: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31984 at Fri May 19 17:13:02 UTC 2017
kill -USR1 31984
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31984 killed at Fri May 19 17:13:02 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:13:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32040 >/dev/null 2>/dev/null
selfserv with PID 32040 found at Fri May 19 17:13:03 UTC 2017
selfserv with PID 32040 started at Fri May 19 17:13:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #961: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32040 at Fri May 19 17:13:04 UTC 2017
kill -USR1 32040
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32040 killed at Fri May 19 17:13:04 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:13:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32096 >/dev/null 2>/dev/null
selfserv with PID 32096 found at Fri May 19 17:13:04 UTC 2017
selfserv with PID 32096 started at Fri May 19 17:13:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #962: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32096 at Fri May 19 17:13:05 UTC 2017
kill -USR1 32096
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32096 killed at Fri May 19 17:13:05 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:13:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32164 >/dev/null 2>/dev/null
selfserv with PID 32164 found at Fri May 19 17:13:05 UTC 2017
selfserv with PID 32164 started at Fri May 19 17:13:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #963: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32164 at Fri May 19 17:13:07 UTC 2017
kill -USR1 32164
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32164 killed at Fri May 19 17:13:07 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:13:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32220 >/dev/null 2>/dev/null
selfserv with PID 32220 found at Fri May 19 17:13:07 UTC 2017
selfserv with PID 32220 started at Fri May 19 17:13:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #964: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32220 at Fri May 19 17:13:08 UTC 2017
kill -USR1 32220
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32220 killed at Fri May 19 17:13:08 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:13:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32276 >/dev/null 2>/dev/null
selfserv with PID 32276 found at Fri May 19 17:13:08 UTC 2017
selfserv with PID 32276 started at Fri May 19 17:13:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #965: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32276 at Fri May 19 17:13:10 UTC 2017
kill -USR1 32276
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32276 killed at Fri May 19 17:13:10 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:13:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32344 >/dev/null 2>/dev/null
selfserv with PID 32344 found at Fri May 19 17:13:10 UTC 2017
selfserv with PID 32344 started at Fri May 19 17:13:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #966: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32344 at Fri May 19 17:13:11 UTC 2017
kill -USR1 32344
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32344 killed at Fri May 19 17:13:11 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:13:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32400 >/dev/null 2>/dev/null
selfserv with PID 32400 found at Fri May 19 17:13:11 UTC 2017
selfserv with PID 32400 started at Fri May 19 17:13:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #967: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32400 at Fri May 19 17:13:12 UTC 2017
kill -USR1 32400
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32400 killed at Fri May 19 17:13:12 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:13:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32456 >/dev/null 2>/dev/null
selfserv with PID 32456 found at Fri May 19 17:13:12 UTC 2017
selfserv with PID 32456 started at Fri May 19 17:13:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #968: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32456 at Fri May 19 17:13:14 UTC 2017
kill -USR1 32456
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32456 killed at Fri May 19 17:13:14 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:13:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32524 >/dev/null 2>/dev/null
selfserv with PID 32524 found at Fri May 19 17:13:14 UTC 2017
selfserv with PID 32524 started at Fri May 19 17:13:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #969: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32524 at Fri May 19 17:13:15 UTC 2017
kill -USR1 32524
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32524 killed at Fri May 19 17:13:15 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:13:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32580 >/dev/null 2>/dev/null
selfserv with PID 32580 found at Fri May 19 17:13:15 UTC 2017
selfserv with PID 32580 started at Fri May 19 17:13:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #970: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32580 at Fri May 19 17:13:16 UTC 2017
kill -USR1 32580
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32580 killed at Fri May 19 17:13:16 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:13:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32636 >/dev/null 2>/dev/null
selfserv with PID 32636 found at Fri May 19 17:13:17 UTC 2017
selfserv with PID 32636 started at Fri May 19 17:13:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #971: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32636 at Fri May 19 17:13:18 UTC 2017
kill -USR1 32636
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32636 killed at Fri May 19 17:13:18 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:13:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32704 >/dev/null 2>/dev/null
selfserv with PID 32704 found at Fri May 19 17:13:18 UTC 2017
selfserv with PID 32704 started at Fri May 19 17:13:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #972: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32704 at Fri May 19 17:13:19 UTC 2017
kill -USR1 32704
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32704 killed at Fri May 19 17:13:19 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:13:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32760 >/dev/null 2>/dev/null
selfserv with PID 32760 found at Fri May 19 17:13:19 UTC 2017
selfserv with PID 32760 started at Fri May 19 17:13:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #973: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32760 at Fri May 19 17:13:21 UTC 2017
kill -USR1 32760
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32760 killed at Fri May 19 17:13:21 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:13:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 348 >/dev/null 2>/dev/null
selfserv with PID 348 found at Fri May 19 17:13:21 UTC 2017
selfserv with PID 348 started at Fri May 19 17:13:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #974: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 348 at Fri May 19 17:13:22 UTC 2017
kill -USR1 348
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 348 killed at Fri May 19 17:13:22 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:13:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 417 >/dev/null 2>/dev/null
selfserv with PID 417 found at Fri May 19 17:13:22 UTC 2017
selfserv with PID 417 started at Fri May 19 17:13:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #975: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 417 at Fri May 19 17:13:24 UTC 2017
kill -USR1 417
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 417 killed at Fri May 19 17:13:24 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:13:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 476 >/dev/null 2>/dev/null
selfserv with PID 476 found at Fri May 19 17:13:24 UTC 2017
selfserv with PID 476 started at Fri May 19 17:13:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #976: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 476 at Fri May 19 17:13:25 UTC 2017
kill -USR1 476
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 476 killed at Fri May 19 17:13:26 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:13:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 538 >/dev/null 2>/dev/null
selfserv with PID 538 found at Fri May 19 17:13:26 UTC 2017
selfserv with PID 538 started at Fri May 19 17:13:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #977: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 538 at Fri May 19 17:13:27 UTC 2017
kill -USR1 538
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 538 killed at Fri May 19 17:13:27 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:13:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 606 >/dev/null 2>/dev/null
selfserv with PID 606 found at Fri May 19 17:13:27 UTC 2017
selfserv with PID 606 started at Fri May 19 17:13:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #978: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 606 at Fri May 19 17:13:29 UTC 2017
kill -USR1 606
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 606 killed at Fri May 19 17:13:29 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:13:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 663 >/dev/null 2>/dev/null
selfserv with PID 663 found at Fri May 19 17:13:29 UTC 2017
selfserv with PID 663 started at Fri May 19 17:13:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #979: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 663 at Fri May 19 17:13:30 UTC 2017
kill -USR1 663
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 663 killed at Fri May 19 17:13:30 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:13:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 721 >/dev/null 2>/dev/null
selfserv with PID 721 found at Fri May 19 17:13:31 UTC 2017
selfserv with PID 721 started at Fri May 19 17:13:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #980: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 721 at Fri May 19 17:13:32 UTC 2017
kill -USR1 721
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 721 killed at Fri May 19 17:13:32 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:13:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 789 >/dev/null 2>/dev/null
selfserv with PID 789 found at Fri May 19 17:13:32 UTC 2017
selfserv with PID 789 started at Fri May 19 17:13:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #981: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 789 at Fri May 19 17:13:34 UTC 2017
kill -USR1 789
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 789 killed at Fri May 19 17:13:34 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:13:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 846 >/dev/null 2>/dev/null
selfserv with PID 846 found at Fri May 19 17:13:34 UTC 2017
selfserv with PID 846 started at Fri May 19 17:13:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #982: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 846 at Fri May 19 17:13:35 UTC 2017
kill -USR1 846
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 846 killed at Fri May 19 17:13:35 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:13:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 903 >/dev/null 2>/dev/null
selfserv with PID 903 found at Fri May 19 17:13:36 UTC 2017
selfserv with PID 903 started at Fri May 19 17:13:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #983: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 903 at Fri May 19 17:13:37 UTC 2017
kill -USR1 903
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 903 killed at Fri May 19 17:13:37 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:13:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 972 >/dev/null 2>/dev/null
selfserv with PID 972 found at Fri May 19 17:13:37 UTC 2017
selfserv with PID 972 started at Fri May 19 17:13:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #984: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 972 at Fri May 19 17:13:39 UTC 2017
kill -USR1 972
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 972 killed at Fri May 19 17:13:39 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:13:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1028 >/dev/null 2>/dev/null
selfserv with PID 1028 found at Fri May 19 17:13:39 UTC 2017
selfserv with PID 1028 started at Fri May 19 17:13:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #985: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1028 at Fri May 19 17:13:40 UTC 2017
kill -USR1 1028
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1028 killed at Fri May 19 17:13:40 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:13:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1084 >/dev/null 2>/dev/null
selfserv with PID 1084 found at Fri May 19 17:13:40 UTC 2017
selfserv with PID 1084 started at Fri May 19 17:13:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #986: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1084 at Fri May 19 17:13:42 UTC 2017
kill -USR1 1084
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1084 killed at Fri May 19 17:13:42 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:13:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1152 >/dev/null 2>/dev/null
selfserv with PID 1152 found at Fri May 19 17:13:42 UTC 2017
selfserv with PID 1152 started at Fri May 19 17:13:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #987: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1152 at Fri May 19 17:13:43 UTC 2017
kill -USR1 1152
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1152 killed at Fri May 19 17:13:43 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:13:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1209 >/dev/null 2>/dev/null
selfserv with PID 1209 found at Fri May 19 17:13:44 UTC 2017
selfserv with PID 1209 started at Fri May 19 17:13:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #988: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1209 at Fri May 19 17:13:45 UTC 2017
kill -USR1 1209
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1209 killed at Fri May 19 17:13:45 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:13:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1265 >/dev/null 2>/dev/null
selfserv with PID 1265 found at Fri May 19 17:13:45 UTC 2017
selfserv with PID 1265 started at Fri May 19 17:13:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #989: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1265 at Fri May 19 17:13:47 UTC 2017
kill -USR1 1265
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1265 killed at Fri May 19 17:13:47 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:13:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1334 >/dev/null 2>/dev/null
selfserv with PID 1334 found at Fri May 19 17:13:47 UTC 2017
selfserv with PID 1334 started at Fri May 19 17:13:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #990: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1334 at Fri May 19 17:13:48 UTC 2017
kill -USR1 1334
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1334 killed at Fri May 19 17:13:48 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:13:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1390 >/dev/null 2>/dev/null
selfserv with PID 1390 found at Fri May 19 17:13:49 UTC 2017
selfserv with PID 1390 started at Fri May 19 17:13:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #991: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1390 at Fri May 19 17:13:50 UTC 2017
kill -USR1 1390
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1390 killed at Fri May 19 17:13:50 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:13:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1446 >/dev/null 2>/dev/null
selfserv with PID 1446 found at Fri May 19 17:13:50 UTC 2017
selfserv with PID 1446 started at Fri May 19 17:13:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #992: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1446 at Fri May 19 17:13:52 UTC 2017
kill -USR1 1446
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1446 killed at Fri May 19 17:13:52 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:13:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1514 >/dev/null 2>/dev/null
selfserv with PID 1514 found at Fri May 19 17:13:52 UTC 2017
selfserv with PID 1514 started at Fri May 19 17:13:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #993: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1514 at Fri May 19 17:13:53 UTC 2017
kill -USR1 1514
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1514 killed at Fri May 19 17:13:53 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:13:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1570 >/dev/null 2>/dev/null
selfserv with PID 1570 found at Fri May 19 17:13:53 UTC 2017
selfserv with PID 1570 started at Fri May 19 17:13:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #994: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1570 at Fri May 19 17:13:55 UTC 2017
kill -USR1 1570
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1570 killed at Fri May 19 17:13:55 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:13:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1651 >/dev/null 2>/dev/null
selfserv with PID 1651 found at Fri May 19 17:13:55 UTC 2017
selfserv with PID 1651 started at Fri May 19 17:13:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #995: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1651 at Fri May 19 17:13:56 UTC 2017
kill -USR1 1651
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1651 killed at Fri May 19 17:13:56 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:13:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1734 >/dev/null 2>/dev/null
selfserv with PID 1734 found at Fri May 19 17:13:56 UTC 2017
selfserv with PID 1734 started at Fri May 19 17:13:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #996: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1734 at Fri May 19 17:13:57 UTC 2017
kill -USR1 1734
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1734 killed at Fri May 19 17:13:57 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:13:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1803 >/dev/null 2>/dev/null
selfserv with PID 1803 found at Fri May 19 17:13:58 UTC 2017
selfserv with PID 1803 started at Fri May 19 17:13:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #997: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1803 at Fri May 19 17:13:59 UTC 2017
kill -USR1 1803
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1803 killed at Fri May 19 17:13:59 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:13:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:13:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1890 >/dev/null 2>/dev/null
selfserv with PID 1890 found at Fri May 19 17:13:59 UTC 2017
selfserv with PID 1890 started at Fri May 19 17:13:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #998: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1890 at Fri May 19 17:14:00 UTC 2017
kill -USR1 1890
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1890 killed at Fri May 19 17:14:00 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:14:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2040 >/dev/null 2>/dev/null
selfserv with PID 2040 found at Fri May 19 17:14:00 UTC 2017
selfserv with PID 2040 started at Fri May 19 17:14:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #999: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2040 at Fri May 19 17:14:02 UTC 2017
kill -USR1 2040
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2040 killed at Fri May 19 17:14:02 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:14:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2180 >/dev/null 2>/dev/null
selfserv with PID 2180 found at Fri May 19 17:14:02 UTC 2017
selfserv with PID 2180 started at Fri May 19 17:14:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1000: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2180 at Fri May 19 17:14:03 UTC 2017
kill -USR1 2180
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2180 killed at Fri May 19 17:14:03 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:14:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2287 >/dev/null 2>/dev/null
selfserv with PID 2287 found at Fri May 19 17:14:03 UTC 2017
selfserv with PID 2287 started at Fri May 19 17:14:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1001: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2287 at Fri May 19 17:14:05 UTC 2017
kill -USR1 2287
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2287 killed at Fri May 19 17:14:05 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:14:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2382 >/dev/null 2>/dev/null
selfserv with PID 2382 found at Fri May 19 17:14:05 UTC 2017
selfserv with PID 2382 started at Fri May 19 17:14:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1002: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2382 at Fri May 19 17:14:06 UTC 2017
kill -USR1 2382
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2382 killed at Fri May 19 17:14:06 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:14:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2460 >/dev/null 2>/dev/null
selfserv with PID 2460 found at Fri May 19 17:14:06 UTC 2017
selfserv with PID 2460 started at Fri May 19 17:14:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1003: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2460 at Fri May 19 17:14:07 UTC 2017
kill -USR1 2460
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2460 killed at Fri May 19 17:14:07 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:14:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2516 >/dev/null 2>/dev/null
selfserv with PID 2516 found at Fri May 19 17:14:08 UTC 2017
selfserv with PID 2516 started at Fri May 19 17:14:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1004: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2516 at Fri May 19 17:14:09 UTC 2017
kill -USR1 2516
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2516 killed at Fri May 19 17:14:09 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:14:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2587 >/dev/null 2>/dev/null
selfserv with PID 2587 found at Fri May 19 17:14:09 UTC 2017
selfserv with PID 2587 started at Fri May 19 17:14:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1005: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2587 at Fri May 19 17:14:10 UTC 2017
kill -USR1 2587
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2587 killed at Fri May 19 17:14:10 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:14:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2646 >/dev/null 2>/dev/null
selfserv with PID 2646 found at Fri May 19 17:14:10 UTC 2017
selfserv with PID 2646 started at Fri May 19 17:14:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1006: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2646 at Fri May 19 17:14:11 UTC 2017
kill -USR1 2646
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2646 killed at Fri May 19 17:14:11 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:14:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2703 >/dev/null 2>/dev/null
selfserv with PID 2703 found at Fri May 19 17:14:11 UTC 2017
selfserv with PID 2703 started at Fri May 19 17:14:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1007: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2703 at Fri May 19 17:14:12 UTC 2017
kill -USR1 2703
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2703 killed at Fri May 19 17:14:12 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:14:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2773 >/dev/null 2>/dev/null
selfserv with PID 2773 found at Fri May 19 17:14:13 UTC 2017
selfserv with PID 2773 started at Fri May 19 17:14:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1008: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2773 at Fri May 19 17:14:14 UTC 2017
kill -USR1 2773
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2773 killed at Fri May 19 17:14:14 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:14:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2830 >/dev/null 2>/dev/null
selfserv with PID 2830 found at Fri May 19 17:14:14 UTC 2017
selfserv with PID 2830 started at Fri May 19 17:14:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1009: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2830 at Fri May 19 17:14:15 UTC 2017
kill -USR1 2830
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2830 killed at Fri May 19 17:14:15 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:14:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2886 >/dev/null 2>/dev/null
selfserv with PID 2886 found at Fri May 19 17:14:15 UTC 2017
selfserv with PID 2886 started at Fri May 19 17:14:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1010: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2886 at Fri May 19 17:14:16 UTC 2017
kill -USR1 2886
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2886 killed at Fri May 19 17:14:17 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:14:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2963 >/dev/null 2>/dev/null
selfserv with PID 2963 found at Fri May 19 17:14:17 UTC 2017
selfserv with PID 2963 started at Fri May 19 17:14:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1011: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2963 at Fri May 19 17:14:18 UTC 2017
kill -USR1 2963
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2963 killed at Fri May 19 17:14:18 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:14:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3019 >/dev/null 2>/dev/null
selfserv with PID 3019 found at Fri May 19 17:14:18 UTC 2017
selfserv with PID 3019 started at Fri May 19 17:14:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1012: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3019 at Fri May 19 17:14:19 UTC 2017
kill -USR1 3019
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3019 killed at Fri May 19 17:14:19 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:14:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3076 >/dev/null 2>/dev/null
selfserv with PID 3076 found at Fri May 19 17:14:19 UTC 2017
selfserv with PID 3076 started at Fri May 19 17:14:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1013: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3076 at Fri May 19 17:14:20 UTC 2017
kill -USR1 3076
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3076 killed at Fri May 19 17:14:20 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:14:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3146 >/dev/null 2>/dev/null
selfserv with PID 3146 found at Fri May 19 17:14:21 UTC 2017
selfserv with PID 3146 started at Fri May 19 17:14:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1014: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3146 at Fri May 19 17:14:22 UTC 2017
kill -USR1 3146
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3146 killed at Fri May 19 17:14:22 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:14:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3203 >/dev/null 2>/dev/null
selfserv with PID 3203 found at Fri May 19 17:14:22 UTC 2017
selfserv with PID 3203 started at Fri May 19 17:14:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1015: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3203 at Fri May 19 17:14:23 UTC 2017
kill -USR1 3203
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3203 killed at Fri May 19 17:14:23 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:14:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3259 >/dev/null 2>/dev/null
selfserv with PID 3259 found at Fri May 19 17:14:23 UTC 2017
selfserv with PID 3259 started at Fri May 19 17:14:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1016: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3259 at Fri May 19 17:14:25 UTC 2017
kill -USR1 3259
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3259 killed at Fri May 19 17:14:25 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:14:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3327 >/dev/null 2>/dev/null
selfserv with PID 3327 found at Fri May 19 17:14:25 UTC 2017
selfserv with PID 3327 started at Fri May 19 17:14:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1017: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3327 at Fri May 19 17:14:26 UTC 2017
kill -USR1 3327
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3327 killed at Fri May 19 17:14:26 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:14:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3383 >/dev/null 2>/dev/null
selfserv with PID 3383 found at Fri May 19 17:14:26 UTC 2017
selfserv with PID 3383 started at Fri May 19 17:14:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1018: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3383 at Fri May 19 17:14:27 UTC 2017
kill -USR1 3383
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3383 killed at Fri May 19 17:14:27 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:14:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3439 >/dev/null 2>/dev/null
selfserv with PID 3439 found at Fri May 19 17:14:27 UTC 2017
selfserv with PID 3439 started at Fri May 19 17:14:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1019: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3439 at Fri May 19 17:14:28 UTC 2017
kill -USR1 3439
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3439 killed at Fri May 19 17:14:28 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:14:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3507 >/dev/null 2>/dev/null
selfserv with PID 3507 found at Fri May 19 17:14:28 UTC 2017
selfserv with PID 3507 started at Fri May 19 17:14:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1020: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3507 at Fri May 19 17:14:29 UTC 2017
kill -USR1 3507
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3507 killed at Fri May 19 17:14:29 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:14:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3563 >/dev/null 2>/dev/null
selfserv with PID 3563 found at Fri May 19 17:14:30 UTC 2017
selfserv with PID 3563 started at Fri May 19 17:14:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1021: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3563 at Fri May 19 17:14:31 UTC 2017
kill -USR1 3563
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3563 killed at Fri May 19 17:14:31 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:14:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3619 >/dev/null 2>/dev/null
selfserv with PID 3619 found at Fri May 19 17:14:31 UTC 2017
selfserv with PID 3619 started at Fri May 19 17:14:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1022: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3619 at Fri May 19 17:14:32 UTC 2017
kill -USR1 3619
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3619 killed at Fri May 19 17:14:32 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:14:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3687 >/dev/null 2>/dev/null
selfserv with PID 3687 found at Fri May 19 17:14:32 UTC 2017
selfserv with PID 3687 started at Fri May 19 17:14:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1023: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3687 at Fri May 19 17:14:33 UTC 2017
kill -USR1 3687
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3687 killed at Fri May 19 17:14:33 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:14:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3743 >/dev/null 2>/dev/null
selfserv with PID 3743 found at Fri May 19 17:14:34 UTC 2017
selfserv with PID 3743 started at Fri May 19 17:14:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1024: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3743 at Fri May 19 17:14:35 UTC 2017
kill -USR1 3743
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3743 killed at Fri May 19 17:14:35 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:14:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3799 >/dev/null 2>/dev/null
selfserv with PID 3799 found at Fri May 19 17:14:35 UTC 2017
selfserv with PID 3799 started at Fri May 19 17:14:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1025: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3799 at Fri May 19 17:14:36 UTC 2017
kill -USR1 3799
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3799 killed at Fri May 19 17:14:36 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:14:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3867 >/dev/null 2>/dev/null
selfserv with PID 3867 found at Fri May 19 17:14:36 UTC 2017
selfserv with PID 3867 started at Fri May 19 17:14:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1026: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3867 at Fri May 19 17:14:37 UTC 2017
kill -USR1 3867
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3867 killed at Fri May 19 17:14:37 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:14:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3923 >/dev/null 2>/dev/null
selfserv with PID 3923 found at Fri May 19 17:14:37 UTC 2017
selfserv with PID 3923 started at Fri May 19 17:14:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1027: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3923 at Fri May 19 17:14:39 UTC 2017
kill -USR1 3923
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3923 killed at Fri May 19 17:14:39 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:14:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3980 >/dev/null 2>/dev/null
selfserv with PID 3980 found at Fri May 19 17:14:39 UTC 2017
selfserv with PID 3980 started at Fri May 19 17:14:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1028: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3980 at Fri May 19 17:14:40 UTC 2017
kill -USR1 3980
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3980 killed at Fri May 19 17:14:40 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:14:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4048 >/dev/null 2>/dev/null
selfserv with PID 4048 found at Fri May 19 17:14:40 UTC 2017
selfserv with PID 4048 started at Fri May 19 17:14:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1029: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4048 at Fri May 19 17:14:41 UTC 2017
kill -USR1 4048
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4048 killed at Fri May 19 17:14:41 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:14:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4104 >/dev/null 2>/dev/null
selfserv with PID 4104 found at Fri May 19 17:14:41 UTC 2017
selfserv with PID 4104 started at Fri May 19 17:14:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1030: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4104 at Fri May 19 17:14:42 UTC 2017
kill -USR1 4104
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4104 killed at Fri May 19 17:14:42 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:14:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4160 >/dev/null 2>/dev/null
selfserv with PID 4160 found at Fri May 19 17:14:42 UTC 2017
selfserv with PID 4160 started at Fri May 19 17:14:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1031: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4160 at Fri May 19 17:14:43 UTC 2017
kill -USR1 4160
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4160 killed at Fri May 19 17:14:43 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:14:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4228 >/dev/null 2>/dev/null
selfserv with PID 4228 found at Fri May 19 17:14:44 UTC 2017
selfserv with PID 4228 started at Fri May 19 17:14:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1032: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4228 at Fri May 19 17:14:45 UTC 2017
kill -USR1 4228
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4228 killed at Fri May 19 17:14:45 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:14:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4284 >/dev/null 2>/dev/null
selfserv with PID 4284 found at Fri May 19 17:14:45 UTC 2017
selfserv with PID 4284 started at Fri May 19 17:14:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1033: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4284 at Fri May 19 17:14:46 UTC 2017
kill -USR1 4284
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4284 killed at Fri May 19 17:14:46 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:14:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4340 >/dev/null 2>/dev/null
selfserv with PID 4340 found at Fri May 19 17:14:46 UTC 2017
selfserv with PID 4340 started at Fri May 19 17:14:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1034: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4340 at Fri May 19 17:14:47 UTC 2017
kill -USR1 4340
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4340 killed at Fri May 19 17:14:47 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:14:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4408 >/dev/null 2>/dev/null
selfserv with PID 4408 found at Fri May 19 17:14:48 UTC 2017
selfserv with PID 4408 started at Fri May 19 17:14:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1035: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4408 at Fri May 19 17:14:49 UTC 2017
kill -USR1 4408
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4408 killed at Fri May 19 17:14:49 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:14:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4464 >/dev/null 2>/dev/null
selfserv with PID 4464 found at Fri May 19 17:14:49 UTC 2017
selfserv with PID 4464 started at Fri May 19 17:14:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1036: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4464 at Fri May 19 17:14:50 UTC 2017
kill -USR1 4464
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4464 killed at Fri May 19 17:14:50 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:14:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4520 >/dev/null 2>/dev/null
selfserv with PID 4520 found at Fri May 19 17:14:50 UTC 2017
selfserv with PID 4520 started at Fri May 19 17:14:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1037: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4520 at Fri May 19 17:14:51 UTC 2017
kill -USR1 4520
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4520 killed at Fri May 19 17:14:51 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:14:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4588 >/dev/null 2>/dev/null
selfserv with PID 4588 found at Fri May 19 17:14:52 UTC 2017
selfserv with PID 4588 started at Fri May 19 17:14:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1038: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4588 at Fri May 19 17:14:53 UTC 2017
kill -USR1 4588
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4588 killed at Fri May 19 17:14:53 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:14:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4644 >/dev/null 2>/dev/null
selfserv with PID 4644 found at Fri May 19 17:14:53 UTC 2017
selfserv with PID 4644 started at Fri May 19 17:14:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1039: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4644 at Fri May 19 17:14:55 UTC 2017
kill -USR1 4644
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4644 killed at Fri May 19 17:14:55 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:14:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4700 >/dev/null 2>/dev/null
selfserv with PID 4700 found at Fri May 19 17:14:55 UTC 2017
selfserv with PID 4700 started at Fri May 19 17:14:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1040: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4700 at Fri May 19 17:14:56 UTC 2017
kill -USR1 4700
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4700 killed at Fri May 19 17:14:56 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:14:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4768 >/dev/null 2>/dev/null
selfserv with PID 4768 found at Fri May 19 17:14:56 UTC 2017
selfserv with PID 4768 started at Fri May 19 17:14:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1041: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4768 at Fri May 19 17:14:57 UTC 2017
kill -USR1 4768
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4768 killed at Fri May 19 17:14:58 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:14:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4825 >/dev/null 2>/dev/null
selfserv with PID 4825 found at Fri May 19 17:14:58 UTC 2017
selfserv with PID 4825 started at Fri May 19 17:14:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1042: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4825 at Fri May 19 17:14:59 UTC 2017
kill -USR1 4825
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4825 killed at Fri May 19 17:14:59 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:14:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:14:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4888 >/dev/null 2>/dev/null
selfserv with PID 4888 found at Fri May 19 17:14:59 UTC 2017
selfserv with PID 4888 started at Fri May 19 17:14:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w bogus -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1043: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4888 at Fri May 19 17:15:00 UTC 2017
kill -USR1 4888
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4888 killed at Fri May 19 17:15:00 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:15:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4956 >/dev/null 2>/dev/null
selfserv with PID 4956 found at Fri May 19 17:15:01 UTC 2017
selfserv with PID 4956 started at Fri May 19 17:15:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1044: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4956 at Fri May 19 17:15:02 UTC 2017
kill -USR1 4956
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4956 killed at Fri May 19 17:15:02 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:15:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5030 >/dev/null 2>/dev/null
selfserv with PID 5030 found at Fri May 19 17:15:02 UTC 2017
selfserv with PID 5030 started at Fri May 19 17:15:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1045: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5030 at Fri May 19 17:15:04 UTC 2017
kill -USR1 5030
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5030 killed at Fri May 19 17:15:04 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:15:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5086 >/dev/null 2>/dev/null
selfserv with PID 5086 found at Fri May 19 17:15:04 UTC 2017
selfserv with PID 5086 started at Fri May 19 17:15:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1046: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5086 at Fri May 19 17:15:05 UTC 2017
kill -USR1 5086
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5086 killed at Fri May 19 17:15:05 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:15:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5154 >/dev/null 2>/dev/null
selfserv with PID 5154 found at Fri May 19 17:15:05 UTC 2017
selfserv with PID 5154 started at Fri May 19 17:15:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1047: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5154 at Fri May 19 17:15:07 UTC 2017
kill -USR1 5154
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5154 killed at Fri May 19 17:15:07 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:15:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5210 >/dev/null 2>/dev/null
selfserv with PID 5210 found at Fri May 19 17:15:07 UTC 2017
selfserv with PID 5210 started at Fri May 19 17:15:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1048: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5210 at Fri May 19 17:15:08 UTC 2017
kill -USR1 5210
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5210 killed at Fri May 19 17:15:08 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:15:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5266 >/dev/null 2>/dev/null
selfserv with PID 5266 found at Fri May 19 17:15:09 UTC 2017
selfserv with PID 5266 started at Fri May 19 17:15:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1049: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5266 at Fri May 19 17:15:10 UTC 2017
kill -USR1 5266
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5266 killed at Fri May 19 17:15:10 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:15:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5334 >/dev/null 2>/dev/null
selfserv with PID 5334 found at Fri May 19 17:15:10 UTC 2017
selfserv with PID 5334 started at Fri May 19 17:15:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1050: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5334 at Fri May 19 17:15:12 UTC 2017
kill -USR1 5334
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5334 killed at Fri May 19 17:15:12 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:15:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5390 >/dev/null 2>/dev/null
selfserv with PID 5390 found at Fri May 19 17:15:12 UTC 2017
selfserv with PID 5390 started at Fri May 19 17:15:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1051: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5390 at Fri May 19 17:15:14 UTC 2017
kill -USR1 5390
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5390 killed at Fri May 19 17:15:14 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:15:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5446 >/dev/null 2>/dev/null
selfserv with PID 5446 found at Fri May 19 17:15:14 UTC 2017
selfserv with PID 5446 started at Fri May 19 17:15:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1052: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5446 at Fri May 19 17:15:15 UTC 2017
kill -USR1 5446
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5446 killed at Fri May 19 17:15:16 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:15:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5514 >/dev/null 2>/dev/null
selfserv with PID 5514 found at Fri May 19 17:15:16 UTC 2017
selfserv with PID 5514 started at Fri May 19 17:15:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1053: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5514 at Fri May 19 17:15:17 UTC 2017
kill -USR1 5514
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5514 killed at Fri May 19 17:15:17 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:15:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5570 >/dev/null 2>/dev/null
selfserv with PID 5570 found at Fri May 19 17:15:17 UTC 2017
selfserv with PID 5570 started at Fri May 19 17:15:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1054: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5570 at Fri May 19 17:15:19 UTC 2017
kill -USR1 5570
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5570 killed at Fri May 19 17:15:19 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:15:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5626 >/dev/null 2>/dev/null
selfserv with PID 5626 found at Fri May 19 17:15:19 UTC 2017
selfserv with PID 5626 started at Fri May 19 17:15:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1055: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5626 at Fri May 19 17:15:20 UTC 2017
kill -USR1 5626
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5626 killed at Fri May 19 17:15:21 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:15:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5762 >/dev/null 2>/dev/null
selfserv with PID 5762 found at Fri May 19 17:15:21 UTC 2017
selfserv with PID 5762 started at Fri May 19 17:15:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1056: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5762 at Fri May 19 17:15:22 UTC 2017
kill -USR1 5762
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5762 killed at Fri May 19 17:15:22 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:15:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5818 >/dev/null 2>/dev/null
selfserv with PID 5818 found at Fri May 19 17:15:22 UTC 2017
selfserv with PID 5818 started at Fri May 19 17:15:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1057: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5818 at Fri May 19 17:15:24 UTC 2017
kill -USR1 5818
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5818 killed at Fri May 19 17:15:24 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:15:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5874 >/dev/null 2>/dev/null
selfserv with PID 5874 found at Fri May 19 17:15:24 UTC 2017
selfserv with PID 5874 started at Fri May 19 17:15:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1058: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5874 at Fri May 19 17:15:26 UTC 2017
kill -USR1 5874
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5874 killed at Fri May 19 17:15:26 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:15:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5942 >/dev/null 2>/dev/null
selfserv with PID 5942 found at Fri May 19 17:15:26 UTC 2017
selfserv with PID 5942 started at Fri May 19 17:15:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1059: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5942 at Fri May 19 17:15:27 UTC 2017
kill -USR1 5942
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5942 killed at Fri May 19 17:15:27 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:15:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5998 >/dev/null 2>/dev/null
selfserv with PID 5998 found at Fri May 19 17:15:27 UTC 2017
selfserv with PID 5998 started at Fri May 19 17:15:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1060: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5998 at Fri May 19 17:15:28 UTC 2017
kill -USR1 5998
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5998 killed at Fri May 19 17:15:29 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:15:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6054 >/dev/null 2>/dev/null
selfserv with PID 6054 found at Fri May 19 17:15:29 UTC 2017
selfserv with PID 6054 started at Fri May 19 17:15:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1061: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6054 at Fri May 19 17:15:30 UTC 2017
kill -USR1 6054
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6054 killed at Fri May 19 17:15:30 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:15:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6122 >/dev/null 2>/dev/null
selfserv with PID 6122 found at Fri May 19 17:15:30 UTC 2017
selfserv with PID 6122 started at Fri May 19 17:15:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1062: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6122 at Fri May 19 17:15:32 UTC 2017
kill -USR1 6122
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6122 killed at Fri May 19 17:15:32 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:15:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6178 >/dev/null 2>/dev/null
selfserv with PID 6178 found at Fri May 19 17:15:32 UTC 2017
selfserv with PID 6178 started at Fri May 19 17:15:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1063: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6178 at Fri May 19 17:15:33 UTC 2017
kill -USR1 6178
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6178 killed at Fri May 19 17:15:33 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:15:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6234 >/dev/null 2>/dev/null
selfserv with PID 6234 found at Fri May 19 17:15:33 UTC 2017
selfserv with PID 6234 started at Fri May 19 17:15:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1064: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6234 at Fri May 19 17:15:35 UTC 2017
kill -USR1 6234
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6234 killed at Fri May 19 17:15:35 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:15:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6302 >/dev/null 2>/dev/null
selfserv with PID 6302 found at Fri May 19 17:15:35 UTC 2017
selfserv with PID 6302 started at Fri May 19 17:15:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1065: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6302 at Fri May 19 17:15:36 UTC 2017
kill -USR1 6302
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6302 killed at Fri May 19 17:15:36 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:15:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6358 >/dev/null 2>/dev/null
selfserv with PID 6358 found at Fri May 19 17:15:36 UTC 2017
selfserv with PID 6358 started at Fri May 19 17:15:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1066: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6358 at Fri May 19 17:15:37 UTC 2017
kill -USR1 6358
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6358 killed at Fri May 19 17:15:37 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:15:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6414 >/dev/null 2>/dev/null
selfserv with PID 6414 found at Fri May 19 17:15:37 UTC 2017
selfserv with PID 6414 started at Fri May 19 17:15:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1067: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6414 at Fri May 19 17:15:38 UTC 2017
kill -USR1 6414
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6414 killed at Fri May 19 17:15:38 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:15:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6482 >/dev/null 2>/dev/null
selfserv with PID 6482 found at Fri May 19 17:15:39 UTC 2017
selfserv with PID 6482 started at Fri May 19 17:15:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1068: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6482 at Fri May 19 17:15:40 UTC 2017
kill -USR1 6482
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6482 killed at Fri May 19 17:15:40 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:15:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6538 >/dev/null 2>/dev/null
selfserv with PID 6538 found at Fri May 19 17:15:40 UTC 2017
selfserv with PID 6538 started at Fri May 19 17:15:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1069: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6538 at Fri May 19 17:15:41 UTC 2017
kill -USR1 6538
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6538 killed at Fri May 19 17:15:42 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:15:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6594 >/dev/null 2>/dev/null
selfserv with PID 6594 found at Fri May 19 17:15:42 UTC 2017
selfserv with PID 6594 started at Fri May 19 17:15:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1070: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6594 at Fri May 19 17:15:43 UTC 2017
kill -USR1 6594
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6594 killed at Fri May 19 17:15:43 UTC 2017
ssl.sh: Cache CRL SSL Client Tests   - with ECC ===============================
/<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/authin.tl.tmp
0
selfserv starting at Fri May 19 17:15:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:15:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:43 UTC 2017
selfserv with PID 6658 started at Fri May 19 17:15:43 UTC 2017
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:44 UTC 2017
ssl.sh: #1071: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:45 UTC 2017
ssl.sh: #1072: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:45 UTC 2017
ssl.sh: #1073: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:46 UTC 2017
ssl.sh: #1074: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:46 UTC 2017
ssl.sh: #1075: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:47 UTC 2017
ssl.sh: #1076: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:47 UTC 2017
ssl.sh: #1077: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:48 UTC 2017
ssl.sh: #1078: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:48 UTC 2017
ssl.sh: #1079: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:49 UTC 2017
ssl.sh: #1080: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:50 UTC 2017
ssl.sh: #1081: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:50 UTC 2017
ssl.sh: #1082: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:51 UTC 2017
ssl.sh: #1083: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 96 bytes
tstclnt: Writing 96 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:51 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1084: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:52 UTC 2017
ssl.sh: #1085: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:52 UTC 2017
ssl.sh: #1086: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:53 UTC 2017
ssl.sh: #1087: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:53 UTC 2017
ssl.sh: #1088: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:54 UTC 2017
ssl.sh: #1089: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:54 UTC 2017
ssl.sh: #1090: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:55 UTC 2017
ssl.sh: #1091: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:55 UTC 2017
ssl.sh: #1092: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:56 UTC 2017
ssl.sh: #1093: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:56 UTC 2017
ssl.sh: #1094: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:57 UTC 2017
ssl.sh: #1095: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:58 UTC 2017
ssl.sh: #1096: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:58 UTC 2017
ssl.sh: #1097: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 96 bytes
tstclnt: Writing 96 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:59 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1098: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:15:59 UTC 2017
ssl.sh: #1099: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:16:00 UTC 2017
ssl.sh: #1100: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:16:00 UTC 2017
ssl.sh: #1101: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:16:01 UTC 2017
ssl.sh: #1102: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:16:01 UTC 2017
ssl.sh: #1103: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:16:02 UTC 2017
ssl.sh: #1104: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:16:02 UTC 2017
ssl.sh: #1105: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:16:03 UTC 2017
ssl.sh: #1106: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:16:03 UTC 2017
ssl.sh: #1107: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:16:04 UTC 2017
ssl.sh: #1108: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:16:04 UTC 2017
ssl.sh: #1109: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:16:05 UTC 2017
ssl.sh: #1110: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 6658 >/dev/null 2>/dev/null
selfserv with PID 6658 found at Fri May 19 17:16:06 UTC 2017
ssl.sh: #1111: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 6658 at Fri May 19 17:16:06 UTC 2017
kill -USR1 6658
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6658 killed at Fri May 19 17:16:06 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Fri May 19 17:16:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:16:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:06 UTC 2017
selfserv with PID 8082 started at Fri May 19 17:16:06 UTC 2017
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:07 UTC 2017
ssl.sh: #1112: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:07 UTC 2017
ssl.sh: #1113: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:08 UTC 2017
ssl.sh: #1114: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:08 UTC 2017
ssl.sh: #1115: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:09 UTC 2017
ssl.sh: #1116: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:09 UTC 2017
ssl.sh: #1117: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:10 UTC 2017
ssl.sh: #1118: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:10 UTC 2017
ssl.sh: #1119: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:11 UTC 2017
ssl.sh: #1120: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:11 UTC 2017
ssl.sh: #1121: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:12 UTC 2017
ssl.sh: #1122: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:12 UTC 2017
ssl.sh: #1123: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:13 UTC 2017
ssl.sh: #1124: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 96 bytes
tstclnt: Writing 96 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:14 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1125: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:14 UTC 2017
ssl.sh: #1126: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:15 UTC 2017
ssl.sh: #1127: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:15 UTC 2017
ssl.sh: #1128: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:16 UTC 2017
ssl.sh: #1129: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:16 UTC 2017
ssl.sh: #1130: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:17 UTC 2017
ssl.sh: #1131: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:17 UTC 2017
ssl.sh: #1132: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:17 UTC 2017
ssl.sh: #1133: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:18 UTC 2017
ssl.sh: #1134: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:19 UTC 2017
ssl.sh: #1135: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:19 UTC 2017
ssl.sh: #1136: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:20 UTC 2017
ssl.sh: #1137: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:20 UTC 2017
ssl.sh: #1138: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 96 bytes
tstclnt: Writing 96 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:21 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1139: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:21 UTC 2017
ssl.sh: #1140: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:22 UTC 2017
ssl.sh: #1141: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:22 UTC 2017
ssl.sh: #1142: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:22 UTC 2017
ssl.sh: #1143: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:23 UTC 2017
ssl.sh: #1144: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:23 UTC 2017
ssl.sh: #1145: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:24 UTC 2017
ssl.sh: #1146: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:24 UTC 2017
ssl.sh: #1147: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:25 UTC 2017
ssl.sh: #1148: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:25 UTC 2017
ssl.sh: #1149: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:26 UTC 2017
ssl.sh: #1150: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:26 UTC 2017
ssl.sh: #1151: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8082 >/dev/null 2>/dev/null
selfserv with PID 8082 found at Fri May 19 17:16:27 UTC 2017
ssl.sh: #1152: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 8082 at Fri May 19 17:16:27 UTC 2017
kill -USR1 8082
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8082 killed at Fri May 19 17:16:27 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Fri May 19 17:16:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:16:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:27 UTC 2017
selfserv with PID 9509 started at Fri May 19 17:16:27 UTC 2017
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:28 UTC 2017
ssl.sh: #1153: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:29 UTC 2017
ssl.sh: #1154: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:30 UTC 2017
ssl.sh: #1155: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:30 UTC 2017
ssl.sh: #1156: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:31 UTC 2017
ssl.sh: #1157: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:32 UTC 2017
ssl.sh: #1158: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:32 UTC 2017
ssl.sh: #1159: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:33 UTC 2017
ssl.sh: #1160: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:33 UTC 2017
ssl.sh: #1161: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:34 UTC 2017
ssl.sh: #1162: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:35 UTC 2017
ssl.sh: #1163: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:35 UTC 2017
ssl.sh: #1164: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:36 UTC 2017
ssl.sh: #1165: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:37 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1166: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:37 UTC 2017
ssl.sh: #1167: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:38 UTC 2017
ssl.sh: #1168: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:38 UTC 2017
ssl.sh: #1169: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:39 UTC 2017
ssl.sh: #1170: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:39 UTC 2017
ssl.sh: #1171: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:40 UTC 2017
ssl.sh: #1172: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:41 UTC 2017
ssl.sh: #1173: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:41 UTC 2017
ssl.sh: #1174: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:42 UTC 2017
ssl.sh: #1175: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:42 UTC 2017
ssl.sh: #1176: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:43 UTC 2017
ssl.sh: #1177: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:44 UTC 2017
ssl.sh: #1178: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:44 UTC 2017
ssl.sh: #1179: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:45 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1180: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:46 UTC 2017
ssl.sh: #1181: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:46 UTC 2017
ssl.sh: #1182: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:47 UTC 2017
ssl.sh: #1183: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:47 UTC 2017
ssl.sh: #1184: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:48 UTC 2017
ssl.sh: #1185: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:48 UTC 2017
ssl.sh: #1186: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:49 UTC 2017
ssl.sh: #1187: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:50 UTC 2017
ssl.sh: #1188: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:50 UTC 2017
ssl.sh: #1189: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:51 UTC 2017
ssl.sh: #1190: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:51 UTC 2017
ssl.sh: #1191: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:52 UTC 2017
ssl.sh: #1192: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9509 >/dev/null 2>/dev/null
selfserv with PID 9509 found at Fri May 19 17:16:52 UTC 2017
ssl.sh: #1193: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 9509 at Fri May 19 17:16:53 UTC 2017
kill -USR1 9509
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9509 killed at Fri May 19 17:16:53 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:16:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:16:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:16:53 UTC 2017
selfserv with PID 10932 started at Fri May 19 17:16:53 UTC 2017
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:16:54 UTC 2017
ssl.sh: #1194: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:16:54 UTC 2017
ssl.sh: #1195: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:16:55 UTC 2017
ssl.sh: #1196: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:16:55 UTC 2017
ssl.sh: #1197: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:16:56 UTC 2017
ssl.sh: #1198: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:16:57 UTC 2017
ssl.sh: #1199: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:16:57 UTC 2017
ssl.sh: #1200: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:16:58 UTC 2017
ssl.sh: #1201: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:16:58 UTC 2017
ssl.sh: #1202: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:16:59 UTC 2017
ssl.sh: #1203: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:00 UTC 2017
ssl.sh: #1204: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:00 UTC 2017
ssl.sh: #1205: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:01 UTC 2017
ssl.sh: #1206: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:02 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1207: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:02 UTC 2017
ssl.sh: #1208: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:03 UTC 2017
ssl.sh: #1209: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:03 UTC 2017
ssl.sh: #1210: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:04 UTC 2017
ssl.sh: #1211: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:04 UTC 2017
ssl.sh: #1212: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:05 UTC 2017
ssl.sh: #1213: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:05 UTC 2017
ssl.sh: #1214: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:06 UTC 2017
ssl.sh: #1215: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:06 UTC 2017
ssl.sh: #1216: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:07 UTC 2017
ssl.sh: #1217: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:08 UTC 2017
ssl.sh: #1218: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:08 UTC 2017
ssl.sh: #1219: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:09 UTC 2017
ssl.sh: #1220: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:10 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1221: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:10 UTC 2017
ssl.sh: #1222: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:11 UTC 2017
ssl.sh: #1223: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:11 UTC 2017
ssl.sh: #1224: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:12 UTC 2017
ssl.sh: #1225: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:12 UTC 2017
ssl.sh: #1226: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:13 UTC 2017
ssl.sh: #1227: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:13 UTC 2017
ssl.sh: #1228: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:14 UTC 2017
ssl.sh: #1229: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:14 UTC 2017
ssl.sh: #1230: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:15 UTC 2017
ssl.sh: #1231: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:15 UTC 2017
ssl.sh: #1232: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:16 UTC 2017
ssl.sh: #1233: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 10932 >/dev/null 2>/dev/null
selfserv with PID 10932 found at Fri May 19 17:17:17 UTC 2017
ssl.sh: #1234: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 10932 at Fri May 19 17:17:17 UTC 2017
kill -USR1 10932
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10932 killed at Fri May 19 17:17:17 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:17:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:17:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12358 >/dev/null 2>/dev/null
selfserv with PID 12358 found at Fri May 19 17:17:17 UTC 2017
selfserv with PID 12358 started at Fri May 19 17:17:17 UTC 2017
trying to kill selfserv with PID 12358 at Fri May 19 17:17:17 UTC 2017
kill -USR1 12358
./ssl.sh: line 182: 12358 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} -V ssl3:tls1.2 $verbose -H 1
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12358 killed at Fri May 19 17:17:17 UTC 2017
selfserv starting at Fri May 19 17:17:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:17:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:17 UTC 2017
selfserv with PID 12400 started at Fri May 19 17:17:17 UTC 2017
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:18 UTC 2017
ssl.sh: #1235: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:19 UTC 2017
ssl.sh: #1236: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:20 UTC 2017
ssl.sh: #1237: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:21 UTC 2017
ssl.sh: #1238: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:21 UTC 2017
ssl.sh: #1239: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:22 UTC 2017
ssl.sh: #1240: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:23 UTC 2017
ssl.sh: #1241: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:23 UTC 2017
ssl.sh: #1242: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:24 UTC 2017
ssl.sh: #1243: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:25 UTC 2017
ssl.sh: #1244: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:26 UTC 2017
ssl.sh: #1245: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:26 UTC 2017
ssl.sh: #1246: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:27 UTC 2017
ssl.sh: #1247: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 96 bytes
tstclnt: Writing 96 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:28 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1248: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:29 UTC 2017
ssl.sh: #1249: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:29 UTC 2017
ssl.sh: #1250: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:30 UTC 2017
ssl.sh: #1251: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:31 UTC 2017
ssl.sh: #1252: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:31 UTC 2017
ssl.sh: #1253: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:32 UTC 2017
ssl.sh: #1254: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:33 UTC 2017
ssl.sh: #1255: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:34 UTC 2017
ssl.sh: #1256: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:34 UTC 2017
ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:35 UTC 2017
ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:36 UTC 2017
ssl.sh: #1259: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:37 UTC 2017
ssl.sh: #1260: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:37 UTC 2017
ssl.sh: #1261: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 96 bytes
tstclnt: Writing 96 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:38 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1262: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:39 UTC 2017
ssl.sh: #1263: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:39 UTC 2017
ssl.sh: #1264: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:40 UTC 2017
ssl.sh: #1265: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:41 UTC 2017
ssl.sh: #1266: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:41 UTC 2017
ssl.sh: #1267: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:42 UTC 2017
ssl.sh: #1268: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:43 UTC 2017
ssl.sh: #1269: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:44 UTC 2017
ssl.sh: #1270: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:44 UTC 2017
ssl.sh: #1271: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:45 UTC 2017
ssl.sh: #1272: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:46 UTC 2017
ssl.sh: #1273: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:47 UTC 2017
ssl.sh: #1274: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12400 >/dev/null 2>/dev/null
selfserv with PID 12400 found at Fri May 19 17:17:47 UTC 2017
ssl.sh: #1275: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12400 at Fri May 19 17:17:47 UTC 2017
kill -USR1 12400
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12400 killed at Fri May 19 17:17:48 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:17:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:17:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:17:48 UTC 2017
selfserv with PID 13822 started at Fri May 19 17:17:48 UTC 2017
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:17:49 UTC 2017
ssl.sh: #1276: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:17:50 UTC 2017
ssl.sh: #1277: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:17:51 UTC 2017
ssl.sh: #1278: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:17:52 UTC 2017
ssl.sh: #1279: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:17:53 UTC 2017
ssl.sh: #1280: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:17:54 UTC 2017
ssl.sh: #1281: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:17:54 UTC 2017
ssl.sh: #1282: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:17:55 UTC 2017
ssl.sh: #1283: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:17:56 UTC 2017
ssl.sh: #1284: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:17:57 UTC 2017
ssl.sh: #1285: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:17:58 UTC 2017
ssl.sh: #1286: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:17:59 UTC 2017
ssl.sh: #1287: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:00 UTC 2017
ssl.sh: #1288: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 96 bytes
tstclnt: Writing 96 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:01 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1289: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:02 UTC 2017
ssl.sh: #1290: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:02 UTC 2017
ssl.sh: #1291: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:03 UTC 2017
ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:04 UTC 2017
ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:05 UTC 2017
ssl.sh: #1294: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:06 UTC 2017
ssl.sh: #1295: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:07 UTC 2017
ssl.sh: #1296: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:08 UTC 2017
ssl.sh: #1297: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:09 UTC 2017
ssl.sh: #1298: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:09 UTC 2017
ssl.sh: #1299: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:10 UTC 2017
ssl.sh: #1300: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:11 UTC 2017
ssl.sh: #1301: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:12 UTC 2017
ssl.sh: #1302: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 96 bytes
tstclnt: Writing 96 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:13 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1303: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:14 UTC 2017
ssl.sh: #1304: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:15 UTC 2017
ssl.sh: #1305: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:16 UTC 2017
ssl.sh: #1306: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:16 UTC 2017
ssl.sh: #1307: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:17 UTC 2017
ssl.sh: #1308: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:18 UTC 2017
ssl.sh: #1309: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:19 UTC 2017
ssl.sh: #1310: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:20 UTC 2017
ssl.sh: #1311: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:21 UTC 2017
ssl.sh: #1312: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:22 UTC 2017
ssl.sh: #1313: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:23 UTC 2017
ssl.sh: #1314: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:24 UTC 2017
ssl.sh: #1315: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13822 >/dev/null 2>/dev/null
selfserv with PID 13822 found at Fri May 19 17:18:24 UTC 2017
ssl.sh: #1316: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13822 at Fri May 19 17:18:25 UTC 2017
kill -USR1 13822
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13822 killed at Fri May 19 17:18:25 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:18:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:18:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:25 UTC 2017
selfserv with PID 15244 started at Fri May 19 17:18:25 UTC 2017
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:26 UTC 2017
ssl.sh: #1317: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:27 UTC 2017
ssl.sh: #1318: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:27 UTC 2017
ssl.sh: #1319: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:28 UTC 2017
ssl.sh: #1320: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:28 UTC 2017
ssl.sh: #1321: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:29 UTC 2017
ssl.sh: #1322: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:30 UTC 2017
ssl.sh: #1323: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:31 UTC 2017
ssl.sh: #1324: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:31 UTC 2017
ssl.sh: #1325: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:32 UTC 2017
ssl.sh: #1326: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:33 UTC 2017
ssl.sh: #1327: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:33 UTC 2017
ssl.sh: #1328: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:34 UTC 2017
ssl.sh: #1329: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 96 bytes
tstclnt: Writing 96 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:35 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1330: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:35 UTC 2017
ssl.sh: #1331: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:36 UTC 2017
ssl.sh: #1332: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:37 UTC 2017
ssl.sh: #1333: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:37 UTC 2017
ssl.sh: #1334: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:38 UTC 2017
ssl.sh: #1335: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:39 UTC 2017
ssl.sh: #1336: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:39 UTC 2017
ssl.sh: #1337: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:40 UTC 2017
ssl.sh: #1338: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:41 UTC 2017
ssl.sh: #1339: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:41 UTC 2017
ssl.sh: #1340: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:42 UTC 2017
ssl.sh: #1341: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:43 UTC 2017
ssl.sh: #1342: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:43 UTC 2017
ssl.sh: #1343: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 96 bytes
tstclnt: Writing 96 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:44 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1344: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:45 UTC 2017
ssl.sh: #1345: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:45 UTC 2017
ssl.sh: #1346: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:46 UTC 2017
ssl.sh: #1347: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:47 UTC 2017
ssl.sh: #1348: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:47 UTC 2017
ssl.sh: #1349: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:48 UTC 2017
ssl.sh: #1350: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:49 UTC 2017
ssl.sh: #1351: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:49 UTC 2017
ssl.sh: #1352: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:50 UTC 2017
ssl.sh: #1353: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:51 UTC 2017
ssl.sh: #1354: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:51 UTC 2017
ssl.sh: #1355: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:52 UTC 2017
ssl.sh: #1356: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15244 >/dev/null 2>/dev/null
selfserv with PID 15244 found at Fri May 19 17:18:53 UTC 2017
ssl.sh: #1357: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15244 at Fri May 19 17:18:53 UTC 2017
kill -USR1 15244
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15244 killed at Fri May 19 17:18:53 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:18:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:18:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:18:53 UTC 2017
selfserv with PID 16666 started at Fri May 19 17:18:53 UTC 2017
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:18:54 UTC 2017
ssl.sh: #1358: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:18:55 UTC 2017
ssl.sh: #1359: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:18:56 UTC 2017
ssl.sh: #1360: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:18:57 UTC 2017
ssl.sh: #1361: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:18:58 UTC 2017
ssl.sh: #1362: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:18:59 UTC 2017
ssl.sh: #1363: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:00 UTC 2017
ssl.sh: #1364: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:00 UTC 2017
ssl.sh: #1365: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:01 UTC 2017
ssl.sh: #1366: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:02 UTC 2017
ssl.sh: #1367: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:03 UTC 2017
ssl.sh: #1368: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:04 UTC 2017
ssl.sh: #1369: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:05 UTC 2017
ssl.sh: #1370: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:06 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1371: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:07 UTC 2017
ssl.sh: #1372: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:08 UTC 2017
ssl.sh: #1373: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:08 UTC 2017
ssl.sh: #1374: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:09 UTC 2017
ssl.sh: #1375: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:10 UTC 2017
ssl.sh: #1376: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:11 UTC 2017
ssl.sh: #1377: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:12 UTC 2017
ssl.sh: #1378: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:12 UTC 2017
ssl.sh: #1379: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:13 UTC 2017
ssl.sh: #1380: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:14 UTC 2017
ssl.sh: #1381: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:15 UTC 2017
ssl.sh: #1382: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:16 UTC 2017
ssl.sh: #1383: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:16 UTC 2017
ssl.sh: #1384: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:17 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1385: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:18 UTC 2017
ssl.sh: #1386: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:19 UTC 2017
ssl.sh: #1387: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:20 UTC 2017
ssl.sh: #1388: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:20 UTC 2017
ssl.sh: #1389: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:21 UTC 2017
ssl.sh: #1390: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:22 UTC 2017
ssl.sh: #1391: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:23 UTC 2017
ssl.sh: #1392: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:23 UTC 2017
ssl.sh: #1393: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:24 UTC 2017
ssl.sh: #1394: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:25 UTC 2017
ssl.sh: #1395: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:26 UTC 2017
ssl.sh: #1396: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:26 UTC 2017
ssl.sh: #1397: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16666 >/dev/null 2>/dev/null
selfserv with PID 16666 found at Fri May 19 17:19:27 UTC 2017
ssl.sh: #1398: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16666 at Fri May 19 17:19:27 UTC 2017
kill -USR1 16666
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16666 killed at Fri May 19 17:19:27 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:19:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:19:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:28 UTC 2017
selfserv with PID 18418 started at Fri May 19 17:19:28 UTC 2017
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:29 UTC 2017
ssl.sh: #1399: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:30 UTC 2017
ssl.sh: #1400: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:31 UTC 2017
ssl.sh: #1401: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:32 UTC 2017
ssl.sh: #1402: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:33 UTC 2017
ssl.sh: #1403: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:34 UTC 2017
ssl.sh: #1404: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:35 UTC 2017
ssl.sh: #1405: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:36 UTC 2017
ssl.sh: #1406: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:37 UTC 2017
ssl.sh: #1407: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:38 UTC 2017
ssl.sh: #1408: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:39 UTC 2017
ssl.sh: #1409: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:40 UTC 2017
ssl.sh: #1410: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:41 UTC 2017
ssl.sh: #1411: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:42 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1412: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:43 UTC 2017
ssl.sh: #1413: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:44 UTC 2017
ssl.sh: #1414: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:45 UTC 2017
ssl.sh: #1415: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:46 UTC 2017
ssl.sh: #1416: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:46 UTC 2017
ssl.sh: #1417: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:47 UTC 2017
ssl.sh: #1418: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:48 UTC 2017
ssl.sh: #1419: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:49 UTC 2017
ssl.sh: #1420: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:50 UTC 2017
ssl.sh: #1421: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:51 UTC 2017
ssl.sh: #1422: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:52 UTC 2017
ssl.sh: #1423: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:53 UTC 2017
ssl.sh: #1424: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:54 UTC 2017
ssl.sh: #1425: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:55 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1426: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:56 UTC 2017
ssl.sh: #1427: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:57 UTC 2017
ssl.sh: #1428: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:58 UTC 2017
ssl.sh: #1429: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:19:59 UTC 2017
ssl.sh: #1430: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:20:00 UTC 2017
ssl.sh: #1431: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:20:01 UTC 2017
ssl.sh: #1432: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:20:02 UTC 2017
ssl.sh: #1433: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:20:03 UTC 2017
ssl.sh: #1434: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:20:04 UTC 2017
ssl.sh: #1435: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:20:05 UTC 2017
ssl.sh: #1436: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:20:06 UTC 2017
ssl.sh: #1437: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:20:07 UTC 2017
ssl.sh: #1438: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18418 >/dev/null 2>/dev/null
selfserv with PID 18418 found at Fri May 19 17:20:07 UTC 2017
ssl.sh: #1439: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18418 at Fri May 19 17:20:08 UTC 2017
kill -USR1 18418
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18418 killed at Fri May 19 17:20:08 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:20:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:20:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:08 UTC 2017
selfserv with PID 19875 started at Fri May 19 17:20:08 UTC 2017
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:09 UTC 2017
ssl.sh: #1440: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:10 UTC 2017
ssl.sh: #1441: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:11 UTC 2017
ssl.sh: #1442: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:11 UTC 2017
ssl.sh: #1443: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:12 UTC 2017
ssl.sh: #1444: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:13 UTC 2017
ssl.sh: #1445: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:14 UTC 2017
ssl.sh: #1446: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:14 UTC 2017
ssl.sh: #1447: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:15 UTC 2017
ssl.sh: #1448: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:16 UTC 2017
ssl.sh: #1449: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:17 UTC 2017
ssl.sh: #1450: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:18 UTC 2017
ssl.sh: #1451: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:18 UTC 2017
ssl.sh: #1452: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:19 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1453: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:20 UTC 2017
ssl.sh: #1454: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:21 UTC 2017
ssl.sh: #1455: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:21 UTC 2017
ssl.sh: #1456: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:22 UTC 2017
ssl.sh: #1457: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:23 UTC 2017
ssl.sh: #1458: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:23 UTC 2017
ssl.sh: #1459: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:24 UTC 2017
ssl.sh: #1460: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:25 UTC 2017
ssl.sh: #1461: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:26 UTC 2017
ssl.sh: #1462: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:26 UTC 2017
ssl.sh: #1463: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:27 UTC 2017
ssl.sh: #1464: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:28 UTC 2017
ssl.sh: #1465: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:29 UTC 2017
ssl.sh: #1466: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:30 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1467: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:30 UTC 2017
ssl.sh: #1468: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:31 UTC 2017
ssl.sh: #1469: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:32 UTC 2017
ssl.sh: #1470: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:32 UTC 2017
ssl.sh: #1471: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:33 UTC 2017
ssl.sh: #1472: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:34 UTC 2017
ssl.sh: #1473: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:34 UTC 2017
ssl.sh: #1474: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:35 UTC 2017
ssl.sh: #1475: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:36 UTC 2017
ssl.sh: #1476: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:37 UTC 2017
ssl.sh: #1477: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:37 UTC 2017
ssl.sh: #1478: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:38 UTC 2017
ssl.sh: #1479: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19875 >/dev/null 2>/dev/null
selfserv with PID 19875 found at Fri May 19 17:20:39 UTC 2017
ssl.sh: #1480: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19875 at Fri May 19 17:20:39 UTC 2017
kill -USR1 19875
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19875 killed at Fri May 19 17:20:39 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:20:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:20:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21305 >/dev/null 2>/dev/null
selfserv with PID 21305 found at Fri May 19 17:20:39 UTC 2017
selfserv with PID 21305 started at Fri May 19 17:20:39 UTC 2017
trying to kill selfserv with PID 21305 at Fri May 19 17:20:39 UTC 2017
kill -USR1 21305
./ssl.sh: line 182: 21305 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} -V ssl3:tls1.2 $verbose -H 1
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21305 killed at Fri May 19 17:20:39 UTC 2017
selfserv starting at Fri May 19 17:20:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:20:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:39 UTC 2017
selfserv with PID 21347 started at Fri May 19 17:20:39 UTC 2017
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:41 UTC 2017
ssl.sh: #1481: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:41 UTC 2017
ssl.sh: #1482: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:42 UTC 2017
ssl.sh: #1483: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:43 UTC 2017
ssl.sh: #1484: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:44 UTC 2017
ssl.sh: #1485: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:44 UTC 2017
ssl.sh: #1486: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:45 UTC 2017
ssl.sh: #1487: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:46 UTC 2017
ssl.sh: #1488: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:46 UTC 2017
ssl.sh: #1489: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:47 UTC 2017
ssl.sh: #1490: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:48 UTC 2017
ssl.sh: #1491: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:49 UTC 2017
ssl.sh: #1492: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:49 UTC 2017
ssl.sh: #1493: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 96 bytes
tstclnt: Writing 96 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:50 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1494: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:51 UTC 2017
ssl.sh: #1495: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:52 UTC 2017
ssl.sh: #1496: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:52 UTC 2017
ssl.sh: #1497: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:53 UTC 2017
ssl.sh: #1498: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:54 UTC 2017
ssl.sh: #1499: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:54 UTC 2017
ssl.sh: #1500: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:55 UTC 2017
ssl.sh: #1501: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:56 UTC 2017
ssl.sh: #1502: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:57 UTC 2017
ssl.sh: #1503: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:57 UTC 2017
ssl.sh: #1504: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:58 UTC 2017
ssl.sh: #1505: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:20:59 UTC 2017
ssl.sh: #1506: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:21:00 UTC 2017
ssl.sh: #1507: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 96 bytes
tstclnt: Writing 96 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:21:00 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1508: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:21:01 UTC 2017
ssl.sh: #1509: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:21:02 UTC 2017
ssl.sh: #1510: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:21:02 UTC 2017
ssl.sh: #1511: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:21:03 UTC 2017
ssl.sh: #1512: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:21:04 UTC 2017
ssl.sh: #1513: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:21:04 UTC 2017
ssl.sh: #1514: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:21:05 UTC 2017
ssl.sh: #1515: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:21:06 UTC 2017
ssl.sh: #1516: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:21:07 UTC 2017
ssl.sh: #1517: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:21:07 UTC 2017
ssl.sh: #1518: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:21:08 UTC 2017
ssl.sh: #1519: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:21:09 UTC 2017
ssl.sh: #1520: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21347 >/dev/null 2>/dev/null
selfserv with PID 21347 found at Fri May 19 17:21:10 UTC 2017
ssl.sh: #1521: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21347 at Fri May 19 17:21:10 UTC 2017
kill -USR1 21347
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21347 killed at Fri May 19 17:21:10 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:21:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:21:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:10 UTC 2017
selfserv with PID 22770 started at Fri May 19 17:21:10 UTC 2017
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:11 UTC 2017
ssl.sh: #1522: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:12 UTC 2017
ssl.sh: #1523: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:13 UTC 2017
ssl.sh: #1524: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:14 UTC 2017
ssl.sh: #1525: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:15 UTC 2017
ssl.sh: #1526: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:16 UTC 2017
ssl.sh: #1527: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:17 UTC 2017
ssl.sh: #1528: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:18 UTC 2017
ssl.sh: #1529: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:19 UTC 2017
ssl.sh: #1530: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:20 UTC 2017
ssl.sh: #1531: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:21 UTC 2017
ssl.sh: #1532: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:21 UTC 2017
ssl.sh: #1533: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:22 UTC 2017
ssl.sh: #1534: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 96 bytes
tstclnt: Writing 96 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:23 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1535: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:24 UTC 2017
ssl.sh: #1536: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:25 UTC 2017
ssl.sh: #1537: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:26 UTC 2017
ssl.sh: #1538: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:26 UTC 2017
ssl.sh: #1539: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:27 UTC 2017
ssl.sh: #1540: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:28 UTC 2017
ssl.sh: #1541: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:29 UTC 2017
ssl.sh: #1542: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:30 UTC 2017
ssl.sh: #1543: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:31 UTC 2017
ssl.sh: #1544: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:32 UTC 2017
ssl.sh: #1545: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:33 UTC 2017
ssl.sh: #1546: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:34 UTC 2017
ssl.sh: #1547: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:35 UTC 2017
ssl.sh: #1548: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 96 bytes
tstclnt: Writing 96 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:35 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1549: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:36 UTC 2017
ssl.sh: #1550: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:37 UTC 2017
ssl.sh: #1551: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:38 UTC 2017
ssl.sh: #1552: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:39 UTC 2017
ssl.sh: #1553: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:40 UTC 2017
ssl.sh: #1554: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:40 UTC 2017
ssl.sh: #1555: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:41 UTC 2017
ssl.sh: #1556: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:42 UTC 2017
ssl.sh: #1557: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:43 UTC 2017
ssl.sh: #1558: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:44 UTC 2017
ssl.sh: #1559: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:45 UTC 2017
ssl.sh: #1560: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:46 UTC 2017
ssl.sh: #1561: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22770 >/dev/null 2>/dev/null
selfserv with PID 22770 found at Fri May 19 17:21:47 UTC 2017
ssl.sh: #1562: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22770 at Fri May 19 17:21:47 UTC 2017
kill -USR1 22770
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22770 killed at Fri May 19 17:21:47 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:21:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:21:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:21:47 UTC 2017
selfserv with PID 24192 started at Fri May 19 17:21:47 UTC 2017
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:21:48 UTC 2017
ssl.sh: #1563: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:21:49 UTC 2017
ssl.sh: #1564: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:21:49 UTC 2017
ssl.sh: #1565: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:21:50 UTC 2017
ssl.sh: #1566: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:21:51 UTC 2017
ssl.sh: #1567: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:21:52 UTC 2017
ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:21:52 UTC 2017
ssl.sh: #1569: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:21:53 UTC 2017
ssl.sh: #1570: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:21:54 UTC 2017
ssl.sh: #1571: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:21:54 UTC 2017
ssl.sh: #1572: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:21:55 UTC 2017
ssl.sh: #1573: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:21:56 UTC 2017
ssl.sh: #1574: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:21:56 UTC 2017
ssl.sh: #1575: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 96 bytes
tstclnt: Writing 96 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:21:57 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1576: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:21:58 UTC 2017
ssl.sh: #1577: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:21:58 UTC 2017
ssl.sh: #1578: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:21:59 UTC 2017
ssl.sh: #1579: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:00 UTC 2017
ssl.sh: #1580: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:00 UTC 2017
ssl.sh: #1581: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:01 UTC 2017
ssl.sh: #1582: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:02 UTC 2017
ssl.sh: #1583: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:02 UTC 2017
ssl.sh: #1584: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:03 UTC 2017
ssl.sh: #1585: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:04 UTC 2017
ssl.sh: #1586: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:04 UTC 2017
ssl.sh: #1587: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:05 UTC 2017
ssl.sh: #1588: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:06 UTC 2017
ssl.sh: #1589: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 96 bytes
tstclnt: Writing 96 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:07 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1590: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:07 UTC 2017
ssl.sh: #1591: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:08 UTC 2017
ssl.sh: #1592: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:08 UTC 2017
ssl.sh: #1593: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:09 UTC 2017
ssl.sh: #1594: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:10 UTC 2017
ssl.sh: #1595: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:10 UTC 2017
ssl.sh: #1596: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:11 UTC 2017
ssl.sh: #1597: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:12 UTC 2017
ssl.sh: #1598: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:12 UTC 2017
ssl.sh: #1599: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:13 UTC 2017
ssl.sh: #1600: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:14 UTC 2017
ssl.sh: #1601: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:15 UTC 2017
ssl.sh: #1602: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Fri May 19 17:22:15 UTC 2017
ssl.sh: #1603: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24192 at Fri May 19 17:22:15 UTC 2017
kill -USR1 24192
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24192 killed at Fri May 19 17:22:15 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:22:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:22:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:15 UTC 2017
selfserv with PID 25614 started at Fri May 19 17:22:16 UTC 2017
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:17 UTC 2017
ssl.sh: #1604: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:18 UTC 2017
ssl.sh: #1605: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:18 UTC 2017
ssl.sh: #1606: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:19 UTC 2017
ssl.sh: #1607: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:20 UTC 2017
ssl.sh: #1608: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:21 UTC 2017
ssl.sh: #1609: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:22 UTC 2017
ssl.sh: #1610: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:22 UTC 2017
ssl.sh: #1611: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:23 UTC 2017
ssl.sh: #1612: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:24 UTC 2017
ssl.sh: #1613: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:25 UTC 2017
ssl.sh: #1614: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:26 UTC 2017
ssl.sh: #1615: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:27 UTC 2017
ssl.sh: #1616: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:27 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1617: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:28 UTC 2017
ssl.sh: #1618: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:29 UTC 2017
ssl.sh: #1619: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:30 UTC 2017
ssl.sh: #1620: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:30 UTC 2017
ssl.sh: #1621: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:31 UTC 2017
ssl.sh: #1622: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:32 UTC 2017
ssl.sh: #1623: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:33 UTC 2017
ssl.sh: #1624: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:33 UTC 2017
ssl.sh: #1625: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:34 UTC 2017
ssl.sh: #1626: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:35 UTC 2017
ssl.sh: #1627: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:36 UTC 2017
ssl.sh: #1628: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:37 UTC 2017
ssl.sh: #1629: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:38 UTC 2017
ssl.sh: #1630: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:38 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1631: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:39 UTC 2017
ssl.sh: #1632: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:40 UTC 2017
ssl.sh: #1633: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:41 UTC 2017
ssl.sh: #1634: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser43-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:41 UTC 2017
ssl.sh: #1635: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser44-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:42 UTC 2017
ssl.sh: #1636: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser45-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:43 UTC 2017
ssl.sh: #1637: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser46-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:44 UTC 2017
ssl.sh: #1638: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser47-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:44 UTC 2017
ssl.sh: #1639: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser48-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:45 UTC 2017
ssl.sh: #1640: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser49-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:46 UTC 2017
ssl.sh: #1641: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser50-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:47 UTC 2017
ssl.sh: #1642: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser51-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:48 UTC 2017
ssl.sh: #1643: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.2 -w nss -n TestUser52-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25614 >/dev/null 2>/dev/null
selfserv with PID 25614 found at Fri May 19 17:22:48 UTC 2017
ssl.sh: #1644: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25614 at Fri May 19 17:22:49 UTC 2017
kill -USR1 25614
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25614 killed at Fri May 19 17:22:49 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:22:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:22:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:22:49 UTC 2017
selfserv with PID 27036 started at Fri May 19 17:22:49 UTC 2017
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:22:50 UTC 2017
ssl.sh: #1645: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:22:51 UTC 2017
ssl.sh: #1646: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:22:52 UTC 2017
ssl.sh: #1647: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:22:53 UTC 2017
ssl.sh: #1648: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:22:54 UTC 2017
ssl.sh: #1649: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:22:55 UTC 2017
ssl.sh: #1650: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:22:56 UTC 2017
ssl.sh: #1651: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:22:57 UTC 2017
ssl.sh: #1652: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:22:58 UTC 2017
ssl.sh: #1653: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:22:59 UTC 2017
ssl.sh: #1654: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:00 UTC 2017
ssl.sh: #1655: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:01 UTC 2017
ssl.sh: #1656: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:02 UTC 2017
ssl.sh: #1657: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:03 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1658: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:04 UTC 2017
ssl.sh: #1659: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:05 UTC 2017
ssl.sh: #1660: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:06 UTC 2017
ssl.sh: #1661: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:07 UTC 2017
ssl.sh: #1662: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:08 UTC 2017
ssl.sh: #1663: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:09 UTC 2017
ssl.sh: #1664: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:10 UTC 2017
ssl.sh: #1665: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:11 UTC 2017
ssl.sh: #1666: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:12 UTC 2017
ssl.sh: #1667: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:13 UTC 2017
ssl.sh: #1668: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:14 UTC 2017
ssl.sh: #1669: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:15 UTC 2017
ssl.sh: #1670: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:16 UTC 2017
ssl.sh: #1671: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:16 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1672: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:17 UTC 2017
ssl.sh: #1673: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:18 UTC 2017
ssl.sh: #1674: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:19 UTC 2017
ssl.sh: #1675: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:20 UTC 2017
ssl.sh: #1676: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:21 UTC 2017
ssl.sh: #1677: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:22 UTC 2017
ssl.sh: #1678: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:23 UTC 2017
ssl.sh: #1679: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:24 UTC 2017
ssl.sh: #1680: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:25 UTC 2017
ssl.sh: #1681: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:26 UTC 2017
ssl.sh: #1682: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:27 UTC 2017
ssl.sh: #1683: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:28 UTC 2017
ssl.sh: #1684: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27036 >/dev/null 2>/dev/null
selfserv with PID 27036 found at Fri May 19 17:23:29 UTC 2017
ssl.sh: #1685: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27036 at Fri May 19 17:23:29 UTC 2017
kill -USR1 27036
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27036 killed at Fri May 19 17:23:29 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:23:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:23:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:29 UTC 2017
selfserv with PID 28476 started at Fri May 19 17:23:29 UTC 2017
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:30 UTC 2017
ssl.sh: #1686: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:31 UTC 2017
ssl.sh: #1687: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:31 UTC 2017
ssl.sh: #1688: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:32 UTC 2017
ssl.sh: #1689: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:33 UTC 2017
ssl.sh: #1690: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:34 UTC 2017
ssl.sh: #1691: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:35 UTC 2017
ssl.sh: #1692: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:35 UTC 2017
ssl.sh: #1693: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:36 UTC 2017
ssl.sh: #1694: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:37 UTC 2017
ssl.sh: #1695: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:38 UTC 2017
ssl.sh: #1696: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:39 UTC 2017
ssl.sh: #1697: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:40 UTC 2017
ssl.sh: #1698: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:40 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1699: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:41 UTC 2017
ssl.sh: #1700: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:42 UTC 2017
ssl.sh: #1701: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:42 UTC 2017
ssl.sh: #1702: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:43 UTC 2017
ssl.sh: #1703: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:44 UTC 2017
ssl.sh: #1704: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:45 UTC 2017
ssl.sh: #1705: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:45 UTC 2017
ssl.sh: #1706: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:46 UTC 2017
ssl.sh: #1707: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:47 UTC 2017
ssl.sh: #1708: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:47 UTC 2017
ssl.sh: #1709: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:48 UTC 2017
ssl.sh: #1710: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:49 UTC 2017
ssl.sh: #1711: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:50 UTC 2017
ssl.sh: #1712: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
          -V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:51 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1713: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:51 UTC 2017
ssl.sh: #1714: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:52 UTC 2017
ssl.sh: #1715: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:53 UTC 2017
ssl.sh: #1716: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:53 UTC 2017
ssl.sh: #1717: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:54 UTC 2017
ssl.sh: #1718: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:55 UTC 2017
ssl.sh: #1719: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:56 UTC 2017
ssl.sh: #1720: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:57 UTC 2017
ssl.sh: #1721: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:57 UTC 2017
ssl.sh: #1722: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:58 UTC 2017
ssl.sh: #1723: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:23:59 UTC 2017
ssl.sh: #1724: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:24:00 UTC 2017
ssl.sh: #1725: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28476 >/dev/null 2>/dev/null
selfserv with PID 28476 found at Fri May 19 17:24:00 UTC 2017
ssl.sh: #1726: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28476 at Fri May 19 17:24:01 UTC 2017
kill -USR1 28476
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28476 killed at Fri May 19 17:24:01 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:24:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:24:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30082 >/dev/null 2>/dev/null
selfserv with PID 30082 found at Fri May 19 17:24:01 UTC 2017
selfserv with PID 30082 started at Fri May 19 17:24:01 UTC 2017
trying to kill selfserv with PID 30082 at Fri May 19 17:24:01 UTC 2017
kill -USR1 30082
./ssl.sh: line 182: 30082 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} -V ssl3:tls1.2 $verbose -H 1
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30082 killed at Fri May 19 17:24:01 UTC 2017
ssl.sh: SSL Cipher Coverage  - server bypass/client normal  - with ECC ===============================
selfserv starting at Fri May 19 17:24:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:24:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:01 UTC 2017
selfserv with PID 30149 started at Fri May 19 17:24:01 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1727: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1728: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1729: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1730: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1731: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1732: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1733: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1734: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1735: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1736: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1737: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1738: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1739: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1740: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1741: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1742: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1743: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1744: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1745: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1746: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1747: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1748: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1749: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1750: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1751: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1752: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1753: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1754: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1755: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1756: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1757: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1758: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1759: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1760: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1761: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1762: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1763: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1764: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1765: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1766: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1767: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1768: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1769: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1770: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1771: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1772: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1773: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1774: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1775: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1776: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1777: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1778: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1779: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1780: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1781: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1782: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1783: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1784: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1785: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1786: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1787: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1788: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1789: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1790: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1791: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1792: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1793: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1794: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1795: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1796: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1797: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1798: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1799: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1800: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1801: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1802: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1803: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1804: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30149 >/dev/null 2>/dev/null
selfserv with PID 30149 found at Fri May 19 17:24:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1805: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30149 at Fri May 19 17:24:26 UTC 2017
kill -USR1 30149
selfserv: 0 cache hits; 79 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30149 killed at Fri May 19 17:24:26 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:24:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:24:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32120 >/dev/null 2>/dev/null
selfserv with PID 32120 found at Fri May 19 17:24:26 UTC 2017
selfserv with PID 32120 started at Fri May 19 17:24:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1806: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32120 >/dev/null 2>/dev/null
selfserv with PID 32120 found at Fri May 19 17:24:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1807: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32120 >/dev/null 2>/dev/null
selfserv with PID 32120 found at Fri May 19 17:24:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1808: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32120 >/dev/null 2>/dev/null
selfserv with PID 32120 found at Fri May 19 17:24:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1809: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32120 >/dev/null 2>/dev/null
selfserv with PID 32120 found at Fri May 19 17:24:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1810: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32120 at Fri May 19 17:24:28 UTC 2017
kill -USR1 32120
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32120 killed at Fri May 19 17:24:28 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:24:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:24:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32258 >/dev/null 2>/dev/null
selfserv with PID 32258 found at Fri May 19 17:24:28 UTC 2017
selfserv with PID 32258 started at Fri May 19 17:24:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1811: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32258 >/dev/null 2>/dev/null
selfserv with PID 32258 found at Fri May 19 17:24:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1812: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32258 >/dev/null 2>/dev/null
selfserv with PID 32258 found at Fri May 19 17:24:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1813: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32258 >/dev/null 2>/dev/null
selfserv with PID 32258 found at Fri May 19 17:24:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1814: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32258 >/dev/null 2>/dev/null
selfserv with PID 32258 found at Fri May 19 17:24:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1815: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 32258 >/dev/null 2>/dev/null
selfserv with PID 32258 found at Fri May 19 17:24:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1816: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 32258 >/dev/null 2>/dev/null
selfserv with PID 32258 found at Fri May 19 17:24:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1817: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32258 >/dev/null 2>/dev/null
selfserv with PID 32258 found at Fri May 19 17:24:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1818: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32258 >/dev/null 2>/dev/null
selfserv with PID 32258 found at Fri May 19 17:24:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1819: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32258 >/dev/null 2>/dev/null
selfserv with PID 32258 found at Fri May 19 17:24:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1820: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 32258 >/dev/null 2>/dev/null
selfserv with PID 32258 found at Fri May 19 17:24:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1821: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 32258 >/dev/null 2>/dev/null
selfserv with PID 32258 found at Fri May 19 17:24:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1822: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32258 >/dev/null 2>/dev/null
selfserv with PID 32258 found at Fri May 19 17:24:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1823: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32258 >/dev/null 2>/dev/null
selfserv with PID 32258 found at Fri May 19 17:24:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1824: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32258 >/dev/null 2>/dev/null
selfserv with PID 32258 found at Fri May 19 17:24:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1825: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32258 at Fri May 19 17:24:34 UTC 2017
kill -USR1 32258
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32258 killed at Fri May 19 17:24:34 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:24:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:24:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32611 >/dev/null 2>/dev/null
selfserv with PID 32611 found at Fri May 19 17:24:34 UTC 2017
selfserv with PID 32611 started at Fri May 19 17:24:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1826: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32611 >/dev/null 2>/dev/null
selfserv with PID 32611 found at Fri May 19 17:24:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1827: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32611 >/dev/null 2>/dev/null
selfserv with PID 32611 found at Fri May 19 17:24:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1828: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32611 >/dev/null 2>/dev/null
selfserv with PID 32611 found at Fri May 19 17:24:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1829: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32611 >/dev/null 2>/dev/null
selfserv with PID 32611 found at Fri May 19 17:24:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1830: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32611 at Fri May 19 17:24:36 UTC 2017
kill -USR1 32611
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32611 killed at Fri May 19 17:24:36 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:24:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:24:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32749 >/dev/null 2>/dev/null
selfserv with PID 32749 found at Fri May 19 17:24:36 UTC 2017
selfserv with PID 32749 started at Fri May 19 17:24:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1831: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32749 >/dev/null 2>/dev/null
selfserv with PID 32749 found at Fri May 19 17:24:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1832: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32749 >/dev/null 2>/dev/null
selfserv with PID 32749 found at Fri May 19 17:24:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1833: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32749 >/dev/null 2>/dev/null
selfserv with PID 32749 found at Fri May 19 17:24:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1834: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32749 >/dev/null 2>/dev/null
selfserv with PID 32749 found at Fri May 19 17:24:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1835: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 32749 >/dev/null 2>/dev/null
selfserv with PID 32749 found at Fri May 19 17:24:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1836: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 32749 >/dev/null 2>/dev/null
selfserv with PID 32749 found at Fri May 19 17:24:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1837: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32749 >/dev/null 2>/dev/null
selfserv with PID 32749 found at Fri May 19 17:24:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1838: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32749 >/dev/null 2>/dev/null
selfserv with PID 32749 found at Fri May 19 17:24:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1839: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32749 >/dev/null 2>/dev/null
selfserv with PID 32749 found at Fri May 19 17:24:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1840: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 32749 >/dev/null 2>/dev/null
selfserv with PID 32749 found at Fri May 19 17:24:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1841: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 32749 >/dev/null 2>/dev/null
selfserv with PID 32749 found at Fri May 19 17:24:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1842: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32749 >/dev/null 2>/dev/null
selfserv with PID 32749 found at Fri May 19 17:24:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1843: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32749 >/dev/null 2>/dev/null
selfserv with PID 32749 found at Fri May 19 17:24:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1844: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32749 >/dev/null 2>/dev/null
selfserv with PID 32749 found at Fri May 19 17:24:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1845: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32749 at Fri May 19 17:24:42 UTC 2017
kill -USR1 32749
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32749 killed at Fri May 19 17:24:42 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:24:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:24:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 645 >/dev/null 2>/dev/null
selfserv with PID 645 found at Fri May 19 17:24:43 UTC 2017
selfserv with PID 645 started at Fri May 19 17:24:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1846: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 645 >/dev/null 2>/dev/null
selfserv with PID 645 found at Fri May 19 17:24:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1847: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 645 >/dev/null 2>/dev/null
selfserv with PID 645 found at Fri May 19 17:24:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1848: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 645 >/dev/null 2>/dev/null
selfserv with PID 645 found at Fri May 19 17:24:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1849: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 645 >/dev/null 2>/dev/null
selfserv with PID 645 found at Fri May 19 17:24:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1850: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 645 at Fri May 19 17:24:45 UTC 2017
kill -USR1 645
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 645 killed at Fri May 19 17:24:45 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:24:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:24:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 785 >/dev/null 2>/dev/null
selfserv with PID 785 found at Fri May 19 17:24:45 UTC 2017
selfserv with PID 785 started at Fri May 19 17:24:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1851: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 785 >/dev/null 2>/dev/null
selfserv with PID 785 found at Fri May 19 17:24:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1852: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 785 >/dev/null 2>/dev/null
selfserv with PID 785 found at Fri May 19 17:24:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1853: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 785 >/dev/null 2>/dev/null
selfserv with PID 785 found at Fri May 19 17:24:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1854: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 785 >/dev/null 2>/dev/null
selfserv with PID 785 found at Fri May 19 17:24:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1855: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 785 >/dev/null 2>/dev/null
selfserv with PID 785 found at Fri May 19 17:24:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1856: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 785 >/dev/null 2>/dev/null
selfserv with PID 785 found at Fri May 19 17:24:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1857: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 785 >/dev/null 2>/dev/null
selfserv with PID 785 found at Fri May 19 17:24:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1858: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 785 >/dev/null 2>/dev/null
selfserv with PID 785 found at Fri May 19 17:24:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1859: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 785 >/dev/null 2>/dev/null
selfserv with PID 785 found at Fri May 19 17:24:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1860: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 785 >/dev/null 2>/dev/null
selfserv with PID 785 found at Fri May 19 17:24:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1861: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 785 >/dev/null 2>/dev/null
selfserv with PID 785 found at Fri May 19 17:24:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1862: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 785 >/dev/null 2>/dev/null
selfserv with PID 785 found at Fri May 19 17:24:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1863: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 785 >/dev/null 2>/dev/null
selfserv with PID 785 found at Fri May 19 17:24:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1864: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 785 >/dev/null 2>/dev/null
selfserv with PID 785 found at Fri May 19 17:24:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1865: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 785 at Fri May 19 17:24:51 UTC 2017
kill -USR1 785
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 785 killed at Fri May 19 17:24:51 UTC 2017
ssl.sh: SSL Client Authentication  - server bypass/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:24:51 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:24:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1189 >/dev/null 2>/dev/null
selfserv with PID 1189 found at Fri May 19 17:24:51 UTC 2017
selfserv with PID 1189 started at Fri May 19 17:24:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1866: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1189 at Fri May 19 17:24:52 UTC 2017
kill -USR1 1189
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1189 killed at Fri May 19 17:24:52 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Fri May 19 17:24:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:24:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1246 >/dev/null 2>/dev/null
selfserv with PID 1246 found at Fri May 19 17:24:52 UTC 2017
selfserv with PID 1246 started at Fri May 19 17:24:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1867: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1246 at Fri May 19 17:24:53 UTC 2017
kill -USR1 1246
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1246 killed at Fri May 19 17:24:53 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Fri May 19 17:24:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:24:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1304 >/dev/null 2>/dev/null
selfserv with PID 1304 found at Fri May 19 17:24:53 UTC 2017
selfserv with PID 1304 started at Fri May 19 17:24:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1868: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1304 at Fri May 19 17:24:54 UTC 2017
kill -USR1 1304
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1304 killed at Fri May 19 17:24:54 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:24:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:24:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1361 >/dev/null 2>/dev/null
selfserv with PID 1361 found at Fri May 19 17:24:55 UTC 2017
selfserv with PID 1361 started at Fri May 19 17:24:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1869: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1361 at Fri May 19 17:24:55 UTC 2017
kill -USR1 1361
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1361 killed at Fri May 19 17:24:56 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Fri May 19 17:24:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:24:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1418 >/dev/null 2>/dev/null
selfserv with PID 1418 found at Fri May 19 17:24:56 UTC 2017
selfserv with PID 1418 started at Fri May 19 17:24:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1870: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1418 at Fri May 19 17:24:57 UTC 2017
kill -USR1 1418
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1418 killed at Fri May 19 17:24:57 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Fri May 19 17:24:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:24:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1475 >/dev/null 2>/dev/null
selfserv with PID 1475 found at Fri May 19 17:24:57 UTC 2017
selfserv with PID 1475 started at Fri May 19 17:24:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1871: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1475 at Fri May 19 17:24:58 UTC 2017
kill -USR1 1475
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1475 killed at Fri May 19 17:24:58 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:24:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:24:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1532 >/dev/null 2>/dev/null
selfserv with PID 1532 found at Fri May 19 17:24:58 UTC 2017
selfserv with PID 1532 started at Fri May 19 17:24:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1872: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1532 at Fri May 19 17:24:59 UTC 2017
kill -USR1 1532
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1532 killed at Fri May 19 17:24:59 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Fri May 19 17:24:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:24:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1589 >/dev/null 2>/dev/null
selfserv with PID 1589 found at Fri May 19 17:24:59 UTC 2017
selfserv with PID 1589 started at Fri May 19 17:24:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1873: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1589 at Fri May 19 17:25:00 UTC 2017
kill -USR1 1589
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1589 killed at Fri May 19 17:25:00 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Fri May 19 17:25:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1646 >/dev/null 2>/dev/null
selfserv with PID 1646 found at Fri May 19 17:25:00 UTC 2017
selfserv with PID 1646 started at Fri May 19 17:25:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1874: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1646 at Fri May 19 17:25:01 UTC 2017
kill -USR1 1646
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1646 killed at Fri May 19 17:25:01 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:25:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1709 >/dev/null 2>/dev/null
selfserv with PID 1709 found at Fri May 19 17:25:01 UTC 2017
selfserv with PID 1709 started at Fri May 19 17:25:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1875: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1709 at Fri May 19 17:25:02 UTC 2017
kill -USR1 1709
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1709 killed at Fri May 19 17:25:03 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Fri May 19 17:25:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1778 >/dev/null 2>/dev/null
selfserv with PID 1778 found at Fri May 19 17:25:03 UTC 2017
selfserv with PID 1778 started at Fri May 19 17:25:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1876: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1778 at Fri May 19 17:25:04 UTC 2017
kill -USR1 1778
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1778 killed at Fri May 19 17:25:04 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Fri May 19 17:25:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1835 >/dev/null 2>/dev/null
selfserv with PID 1835 found at Fri May 19 17:25:04 UTC 2017
selfserv with PID 1835 started at Fri May 19 17:25:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1877: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1835 at Fri May 19 17:25:05 UTC 2017
kill -USR1 1835
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1835 killed at Fri May 19 17:25:05 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:25:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1892 >/dev/null 2>/dev/null
selfserv with PID 1892 found at Fri May 19 17:25:05 UTC 2017
selfserv with PID 1892 started at Fri May 19 17:25:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1878: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1892 at Fri May 19 17:25:06 UTC 2017
kill -USR1 1892
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1892 killed at Fri May 19 17:25:06 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:25:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1949 >/dev/null 2>/dev/null
selfserv with PID 1949 found at Fri May 19 17:25:06 UTC 2017
selfserv with PID 1949 started at Fri May 19 17:25:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1879: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1949 at Fri May 19 17:25:07 UTC 2017
kill -USR1 1949
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1949 killed at Fri May 19 17:25:07 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:25:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2006 >/dev/null 2>/dev/null
selfserv with PID 2006 found at Fri May 19 17:25:08 UTC 2017
selfserv with PID 2006 started at Fri May 19 17:25:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1880: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2006 at Fri May 19 17:25:09 UTC 2017
kill -USR1 2006
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2006 killed at Fri May 19 17:25:09 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:25:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2084 >/dev/null 2>/dev/null
selfserv with PID 2084 found at Fri May 19 17:25:09 UTC 2017
selfserv with PID 2084 started at Fri May 19 17:25:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1881: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2084 at Fri May 19 17:25:10 UTC 2017
kill -USR1 2084
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2084 killed at Fri May 19 17:25:10 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:25:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2141 >/dev/null 2>/dev/null
selfserv with PID 2141 found at Fri May 19 17:25:11 UTC 2017
selfserv with PID 2141 started at Fri May 19 17:25:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1882: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2141 at Fri May 19 17:25:12 UTC 2017
kill -USR1 2141
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2141 killed at Fri May 19 17:25:12 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:25:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2198 >/dev/null 2>/dev/null
selfserv with PID 2198 found at Fri May 19 17:25:12 UTC 2017
selfserv with PID 2198 started at Fri May 19 17:25:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1883: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2198 at Fri May 19 17:25:13 UTC 2017
kill -USR1 2198
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2198 killed at Fri May 19 17:25:13 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:25:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2255 >/dev/null 2>/dev/null
selfserv with PID 2255 found at Fri May 19 17:25:13 UTC 2017
selfserv with PID 2255 started at Fri May 19 17:25:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1884: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2255 at Fri May 19 17:25:15 UTC 2017
kill -USR1 2255
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2255 killed at Fri May 19 17:25:15 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:25:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2312 >/dev/null 2>/dev/null
selfserv with PID 2312 found at Fri May 19 17:25:15 UTC 2017
selfserv with PID 2312 started at Fri May 19 17:25:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1885: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2312 at Fri May 19 17:25:16 UTC 2017
kill -USR1 2312
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2312 killed at Fri May 19 17:25:16 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:25:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2369 >/dev/null 2>/dev/null
selfserv with PID 2369 found at Fri May 19 17:25:17 UTC 2017
selfserv with PID 2369 started at Fri May 19 17:25:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1886: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2369 at Fri May 19 17:25:18 UTC 2017
kill -USR1 2369
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2369 killed at Fri May 19 17:25:18 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:25:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2426 >/dev/null 2>/dev/null
selfserv with PID 2426 found at Fri May 19 17:25:18 UTC 2017
selfserv with PID 2426 started at Fri May 19 17:25:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1887: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2426 at Fri May 19 17:25:20 UTC 2017
kill -USR1 2426
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2426 killed at Fri May 19 17:25:20 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:25:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2483 >/dev/null 2>/dev/null
selfserv with PID 2483 found at Fri May 19 17:25:20 UTC 2017
selfserv with PID 2483 started at Fri May 19 17:25:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1888: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2483 at Fri May 19 17:25:21 UTC 2017
kill -USR1 2483
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2483 killed at Fri May 19 17:25:21 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:25:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2541 >/dev/null 2>/dev/null
selfserv with PID 2541 found at Fri May 19 17:25:21 UTC 2017
selfserv with PID 2541 started at Fri May 19 17:25:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1889: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2541 at Fri May 19 17:25:23 UTC 2017
kill -USR1 2541
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2541 killed at Fri May 19 17:25:23 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:25:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2603 >/dev/null 2>/dev/null
selfserv with PID 2603 found at Fri May 19 17:25:23 UTC 2017
selfserv with PID 2603 started at Fri May 19 17:25:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1890: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2603 at Fri May 19 17:25:24 UTC 2017
kill -USR1 2603
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2603 killed at Fri May 19 17:25:24 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:25:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2660 >/dev/null 2>/dev/null
selfserv with PID 2660 found at Fri May 19 17:25:24 UTC 2017
selfserv with PID 2660 started at Fri May 19 17:25:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1891: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2660 at Fri May 19 17:25:25 UTC 2017
kill -USR1 2660
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2660 killed at Fri May 19 17:25:26 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:25:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2718 >/dev/null 2>/dev/null
selfserv with PID 2718 found at Fri May 19 17:25:26 UTC 2017
selfserv with PID 2718 started at Fri May 19 17:25:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1892: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2718 at Fri May 19 17:25:27 UTC 2017
kill -USR1 2718
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2718 killed at Fri May 19 17:25:27 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:25:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2778 >/dev/null 2>/dev/null
selfserv with PID 2778 found at Fri May 19 17:25:27 UTC 2017
selfserv with PID 2778 started at Fri May 19 17:25:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1893: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2778 at Fri May 19 17:25:28 UTC 2017
kill -USR1 2778
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2778 killed at Fri May 19 17:25:28 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:25:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2836 >/dev/null 2>/dev/null
selfserv with PID 2836 found at Fri May 19 17:25:28 UTC 2017
selfserv with PID 2836 started at Fri May 19 17:25:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1894: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2836 at Fri May 19 17:25:29 UTC 2017
kill -USR1 2836
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2836 killed at Fri May 19 17:25:29 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:25:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2893 >/dev/null 2>/dev/null
selfserv with PID 2893 found at Fri May 19 17:25:30 UTC 2017
selfserv with PID 2893 started at Fri May 19 17:25:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1895: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2893 at Fri May 19 17:25:31 UTC 2017
kill -USR1 2893
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2893 killed at Fri May 19 17:25:31 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:25:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2965 >/dev/null 2>/dev/null
selfserv with PID 2965 found at Fri May 19 17:25:31 UTC 2017
selfserv with PID 2965 started at Fri May 19 17:25:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1896: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2965 at Fri May 19 17:25:32 UTC 2017
kill -USR1 2965
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2965 killed at Fri May 19 17:25:32 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:25:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3022 >/dev/null 2>/dev/null
selfserv with PID 3022 found at Fri May 19 17:25:32 UTC 2017
selfserv with PID 3022 started at Fri May 19 17:25:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1897: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3022 at Fri May 19 17:25:33 UTC 2017
kill -USR1 3022
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3022 killed at Fri May 19 17:25:34 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:25:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3080 >/dev/null 2>/dev/null
selfserv with PID 3080 found at Fri May 19 17:25:34 UTC 2017
selfserv with PID 3080 started at Fri May 19 17:25:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1898: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3080 at Fri May 19 17:25:35 UTC 2017
kill -USR1 3080
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3080 killed at Fri May 19 17:25:35 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:25:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3139 >/dev/null 2>/dev/null
selfserv with PID 3139 found at Fri May 19 17:25:35 UTC 2017
selfserv with PID 3139 started at Fri May 19 17:25:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1899: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3139 at Fri May 19 17:25:36 UTC 2017
kill -USR1 3139
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3139 killed at Fri May 19 17:25:36 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:25:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3197 >/dev/null 2>/dev/null
selfserv with PID 3197 found at Fri May 19 17:25:36 UTC 2017
selfserv with PID 3197 started at Fri May 19 17:25:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1900: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3197 at Fri May 19 17:25:37 UTC 2017
kill -USR1 3197
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3197 killed at Fri May 19 17:25:37 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:25:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3254 >/dev/null 2>/dev/null
selfserv with PID 3254 found at Fri May 19 17:25:37 UTC 2017
selfserv with PID 3254 started at Fri May 19 17:25:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1901: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3254 at Fri May 19 17:25:38 UTC 2017
kill -USR1 3254
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3254 killed at Fri May 19 17:25:39 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:25:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3311 >/dev/null 2>/dev/null
selfserv with PID 3311 found at Fri May 19 17:25:39 UTC 2017
selfserv with PID 3311 started at Fri May 19 17:25:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1902: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3311 at Fri May 19 17:25:40 UTC 2017
kill -USR1 3311
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3311 killed at Fri May 19 17:25:40 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:25:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3368 >/dev/null 2>/dev/null
selfserv with PID 3368 found at Fri May 19 17:25:40 UTC 2017
selfserv with PID 3368 started at Fri May 19 17:25:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1903: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3368 at Fri May 19 17:25:41 UTC 2017
kill -USR1 3368
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3368 killed at Fri May 19 17:25:41 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:25:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3425 >/dev/null 2>/dev/null
selfserv with PID 3425 found at Fri May 19 17:25:41 UTC 2017
selfserv with PID 3425 started at Fri May 19 17:25:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1904: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3425 at Fri May 19 17:25:42 UTC 2017
kill -USR1 3425
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3425 killed at Fri May 19 17:25:42 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:25:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3482 >/dev/null 2>/dev/null
selfserv with PID 3482 found at Fri May 19 17:25:42 UTC 2017
selfserv with PID 3482 started at Fri May 19 17:25:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1905: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3482 at Fri May 19 17:25:44 UTC 2017
kill -USR1 3482
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3482 killed at Fri May 19 17:25:44 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:25:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3539 >/dev/null 2>/dev/null
selfserv with PID 3539 found at Fri May 19 17:25:44 UTC 2017
selfserv with PID 3539 started at Fri May 19 17:25:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1906: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3539 at Fri May 19 17:25:45 UTC 2017
kill -USR1 3539
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3539 killed at Fri May 19 17:25:45 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:25:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3596 >/dev/null 2>/dev/null
selfserv with PID 3596 found at Fri May 19 17:25:45 UTC 2017
selfserv with PID 3596 started at Fri May 19 17:25:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1907: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3596 at Fri May 19 17:25:47 UTC 2017
kill -USR1 3596
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3596 killed at Fri May 19 17:25:47 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:25:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3653 >/dev/null 2>/dev/null
selfserv with PID 3653 found at Fri May 19 17:25:47 UTC 2017
selfserv with PID 3653 started at Fri May 19 17:25:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1908: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3653 at Fri May 19 17:25:48 UTC 2017
kill -USR1 3653
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3653 killed at Fri May 19 17:25:48 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:25:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3710 >/dev/null 2>/dev/null
selfserv with PID 3710 found at Fri May 19 17:25:49 UTC 2017
selfserv with PID 3710 started at Fri May 19 17:25:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1909: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3710 at Fri May 19 17:25:50 UTC 2017
kill -USR1 3710
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3710 killed at Fri May 19 17:25:50 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:25:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3767 >/dev/null 2>/dev/null
selfserv with PID 3767 found at Fri May 19 17:25:50 UTC 2017
selfserv with PID 3767 started at Fri May 19 17:25:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1910: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3767 at Fri May 19 17:25:52 UTC 2017
kill -USR1 3767
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3767 killed at Fri May 19 17:25:52 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:25:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3824 >/dev/null 2>/dev/null
selfserv with PID 3824 found at Fri May 19 17:25:52 UTC 2017
selfserv with PID 3824 started at Fri May 19 17:25:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1911: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3824 at Fri May 19 17:25:54 UTC 2017
kill -USR1 3824
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3824 killed at Fri May 19 17:25:54 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:25:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3881 >/dev/null 2>/dev/null
selfserv with PID 3881 found at Fri May 19 17:25:54 UTC 2017
selfserv with PID 3881 started at Fri May 19 17:25:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1912: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3881 at Fri May 19 17:25:55 UTC 2017
kill -USR1 3881
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3881 killed at Fri May 19 17:25:55 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:25:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3938 >/dev/null 2>/dev/null
selfserv with PID 3938 found at Fri May 19 17:25:55 UTC 2017
selfserv with PID 3938 started at Fri May 19 17:25:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1913: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3938 at Fri May 19 17:25:56 UTC 2017
kill -USR1 3938
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3938 killed at Fri May 19 17:25:57 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:25:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3995 >/dev/null 2>/dev/null
selfserv with PID 3995 found at Fri May 19 17:25:57 UTC 2017
selfserv with PID 3995 started at Fri May 19 17:25:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1914: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3995 at Fri May 19 17:25:58 UTC 2017
kill -USR1 3995
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3995 killed at Fri May 19 17:25:58 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:25:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:25:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4052 >/dev/null 2>/dev/null
selfserv with PID 4052 found at Fri May 19 17:25:58 UTC 2017
selfserv with PID 4052 started at Fri May 19 17:25:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1915: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4052 at Fri May 19 17:25:59 UTC 2017
kill -USR1 4052
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4052 killed at Fri May 19 17:25:59 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Fri May 19 17:26:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4130 >/dev/null 2>/dev/null
selfserv with PID 4130 found at Fri May 19 17:26:00 UTC 2017
selfserv with PID 4130 started at Fri May 19 17:26:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1916: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4130 at Fri May 19 17:26:01 UTC 2017
kill -USR1 4130
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4130 killed at Fri May 19 17:26:01 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Fri May 19 17:26:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4193 >/dev/null 2>/dev/null
selfserv with PID 4193 found at Fri May 19 17:26:01 UTC 2017
selfserv with PID 4193 started at Fri May 19 17:26:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1917: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4193 at Fri May 19 17:26:02 UTC 2017
kill -USR1 4193
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4193 killed at Fri May 19 17:26:02 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Fri May 19 17:26:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4256 >/dev/null 2>/dev/null
selfserv with PID 4256 found at Fri May 19 17:26:02 UTC 2017
selfserv with PID 4256 started at Fri May 19 17:26:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1918: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4256 at Fri May 19 17:26:03 UTC 2017
kill -USR1 4256
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4256 killed at Fri May 19 17:26:03 UTC 2017
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Fri May 19 17:26:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4319 >/dev/null 2>/dev/null
selfserv with PID 4319 found at Fri May 19 17:26:03 UTC 2017
selfserv with PID 4319 started at Fri May 19 17:26:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1919: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4319 at Fri May 19 17:26:04 UTC 2017
kill -USR1 4319
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4319 killed at Fri May 19 17:26:04 UTC 2017
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Fri May 19 17:26:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4382 >/dev/null 2>/dev/null
selfserv with PID 4382 found at Fri May 19 17:26:04 UTC 2017
selfserv with PID 4382 started at Fri May 19 17:26:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -c v -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #1920: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4382 at Fri May 19 17:26:05 UTC 2017
kill -USR1 4382
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4382 killed at Fri May 19 17:26:05 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Fri May 19 17:26:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4445 >/dev/null 2>/dev/null
selfserv with PID 4445 found at Fri May 19 17:26:05 UTC 2017
selfserv with PID 4445 started at Fri May 19 17:26:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1921: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4445 at Fri May 19 17:26:07 UTC 2017
kill -USR1 4445
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4445 killed at Fri May 19 17:26:07 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Fri May 19 17:26:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4508 >/dev/null 2>/dev/null
selfserv with PID 4508 found at Fri May 19 17:26:07 UTC 2017
selfserv with PID 4508 started at Fri May 19 17:26:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1922: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4508 at Fri May 19 17:26:08 UTC 2017
kill -USR1 4508
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4508 killed at Fri May 19 17:26:08 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Fri May 19 17:26:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4571 >/dev/null 2>/dev/null
selfserv with PID 4571 found at Fri May 19 17:26:08 UTC 2017
selfserv with PID 4571 started at Fri May 19 17:26:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser -a testbuildd-sni.(none) -a testbuildd.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #1923: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4571 at Fri May 19 17:26:09 UTC 2017
kill -USR1 4571
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4571 killed at Fri May 19 17:26:09 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Fri May 19 17:26:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4634 >/dev/null 2>/dev/null
selfserv with PID 4634 found at Fri May 19 17:26:09 UTC 2017
selfserv with PID 4634 started at Fri May 19 17:26:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni.(none) -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #1924: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4634 at Fri May 19 17:26:10 UTC 2017
kill -USR1 4634
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4634 killed at Fri May 19 17:26:10 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Fri May 19 17:26:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4697 >/dev/null 2>/dev/null
selfserv with PID 4697 found at Fri May 19 17:26:10 UTC 2017
selfserv with PID 4697 started at Fri May 19 17:26:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1925: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4697 at Fri May 19 17:26:11 UTC 2017
kill -USR1 4697
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4697 killed at Fri May 19 17:26:11 UTC 2017
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test  - server bypass/client normal  - with ECC ===============================
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Fri May 19 17:26:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4808 >/dev/null 2>/dev/null
selfserv with PID 4808 found at Fri May 19 17:26:12 UTC 2017
selfserv with PID 4808 started at Fri May 19 17:26:12 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C c -V ssl3:ssl3 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:26:12 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:26:13 UTC 2017
ssl.sh: #1926: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4808 at Fri May 19 17:26:14 UTC 2017
kill -USR1 4808
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4808 killed at Fri May 19 17:26:14 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Fri May 19 17:26:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4889 >/dev/null 2>/dev/null
selfserv with PID 4889 found at Fri May 19 17:26:14 UTC 2017
selfserv with PID 4889 started at Fri May 19 17:26:14 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C c \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:26:14 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:26:16 UTC 2017
ssl.sh: #1927: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4889 at Fri May 19 17:26:16 UTC 2017
kill -USR1 4889
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4889 killed at Fri May 19 17:26:16 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Fri May 19 17:26:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4963 >/dev/null 2>/dev/null
selfserv with PID 4963 found at Fri May 19 17:26:16 UTC 2017
selfserv with PID 4963 started at Fri May 19 17:26:16 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C c -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:26:16 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:26:18 UTC 2017
ssl.sh: #1928: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4963 at Fri May 19 17:26:18 UTC 2017
kill -USR1 4963
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4963 killed at Fri May 19 17:26:18 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Fri May 19 17:26:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5037 >/dev/null 2>/dev/null
selfserv with PID 5037 found at Fri May 19 17:26:18 UTC 2017
selfserv with PID 5037 started at Fri May 19 17:26:18 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:26:18 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:26:20 UTC 2017
ssl.sh: #1929: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5037 at Fri May 19 17:26:20 UTC 2017
kill -USR1 5037
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5037 killed at Fri May 19 17:26:20 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Fri May 19 17:26:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5111 >/dev/null 2>/dev/null
selfserv with PID 5111 found at Fri May 19 17:26:21 UTC 2017
selfserv with PID 5111 started at Fri May 19 17:26:21 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C c -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:26:21 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:26:23 UTC 2017
ssl.sh: #1930: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5111 at Fri May 19 17:26:23 UTC 2017
kill -USR1 5111
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5111 killed at Fri May 19 17:26:23 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Fri May 19 17:26:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5185 >/dev/null 2>/dev/null
selfserv with PID 5185 found at Fri May 19 17:26:23 UTC 2017
selfserv with PID 5185 started at Fri May 19 17:26:23 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:26:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:26:26 UTC 2017
ssl.sh: #1931: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5185 at Fri May 19 17:26:26 UTC 2017
kill -USR1 5185
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5185 killed at Fri May 19 17:26:26 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Fri May 19 17:26:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5259 >/dev/null 2>/dev/null
selfserv with PID 5259 found at Fri May 19 17:26:26 UTC 2017
selfserv with PID 5259 started at Fri May 19 17:26:26 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:26:26 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:26:28 UTC 2017
ssl.sh: #1932: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5259 at Fri May 19 17:26:28 UTC 2017
kill -USR1 5259
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5259 killed at Fri May 19 17:26:28 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Fri May 19 17:26:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5339 >/dev/null 2>/dev/null
selfserv with PID 5339 found at Fri May 19 17:26:29 UTC 2017
selfserv with PID 5339 started at Fri May 19 17:26:29 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:26:29 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:26:31 UTC 2017
ssl.sh: #1933: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5339 at Fri May 19 17:26:31 UTC 2017
kill -USR1 5339
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5339 killed at Fri May 19 17:26:31 UTC 2017
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Fri May 19 17:26:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5428 >/dev/null 2>/dev/null
selfserv with PID 5428 found at Fri May 19 17:26:31 UTC 2017
selfserv with PID 5428 started at Fri May 19 17:26:31 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:26:31 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:26:36 UTC 2017
ssl.sh: #1934: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5428 at Fri May 19 17:26:36 UTC 2017
kill -USR1 5428
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5428 killed at Fri May 19 17:26:36 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Fri May 19 17:26:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5501 >/dev/null 2>/dev/null
selfserv with PID 5501 found at Fri May 19 17:26:36 UTC 2017
selfserv with PID 5501 started at Fri May 19 17:26:36 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C c -N -n TestUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:26:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:26:40 UTC 2017
ssl.sh: #1935: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5501 at Fri May 19 17:26:40 UTC 2017
kill -USR1 5501
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5501 killed at Fri May 19 17:26:40 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Fri May 19 17:26:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5574 >/dev/null 2>/dev/null
selfserv with PID 5574 found at Fri May 19 17:26:41 UTC 2017
selfserv with PID 5574 started at Fri May 19 17:26:41 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:26:41 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 17:26:42 UTC 2017
ssl.sh: #1936: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5574 at Fri May 19 17:26:42 UTC 2017
kill -USR1 5574
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5574 killed at Fri May 19 17:26:42 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Fri May 19 17:26:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5716 >/dev/null 2>/dev/null
selfserv with PID 5716 found at Fri May 19 17:26:42 UTC 2017
selfserv with PID 5716 started at Fri May 19 17:26:42 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:26:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:26:43 UTC 2017
ssl.sh: #1937: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5716 at Fri May 19 17:26:43 UTC 2017
kill -USR1 5716
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5716 killed at Fri May 19 17:26:43 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Fri May 19 17:26:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5790 >/dev/null 2>/dev/null
selfserv with PID 5790 found at Fri May 19 17:26:43 UTC 2017
selfserv with PID 5790 started at Fri May 19 17:26:43 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:26:43 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:26:44 UTC 2017
ssl.sh: #1938: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5790 at Fri May 19 17:26:44 UTC 2017
kill -USR1 5790
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5790 killed at Fri May 19 17:26:44 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Fri May 19 17:26:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5864 >/dev/null 2>/dev/null
selfserv with PID 5864 found at Fri May 19 17:26:45 UTC 2017
selfserv with PID 5864 started at Fri May 19 17:26:45 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:26:45 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 17:26:46 UTC 2017
ssl.sh: #1939: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5864 at Fri May 19 17:26:46 UTC 2017
kill -USR1 5864
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5864 killed at Fri May 19 17:26:46 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Fri May 19 17:26:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5938 >/dev/null 2>/dev/null
selfserv with PID 5938 found at Fri May 19 17:26:46 UTC 2017
selfserv with PID 5938 started at Fri May 19 17:26:46 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:26:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 17:26:47 UTC 2017
ssl.sh: #1940: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5938 at Fri May 19 17:26:47 UTC 2017
kill -USR1 5938
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5938 killed at Fri May 19 17:26:47 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Fri May 19 17:26:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6018 >/dev/null 2>/dev/null
selfserv with PID 6018 found at Fri May 19 17:26:47 UTC 2017
selfserv with PID 6018 started at Fri May 19 17:26:47 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:26:47 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:26:50 UTC 2017
ssl.sh: #1941: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6018 at Fri May 19 17:26:50 UTC 2017
kill -USR1 6018
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6018 killed at Fri May 19 17:26:50 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Fri May 19 17:26:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a testbuildd-sni.(none) -k testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6098 >/dev/null 2>/dev/null
selfserv with PID 6098 found at Fri May 19 17:26:50 UTC 2017
selfserv with PID 6098 started at Fri May 19 17:26:50 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0:tls1.2 -c 1000 -C c -u -a testbuildd-sni.(none) \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:26:50 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:26:52 UTC 2017
ssl.sh: #1942: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6098 at Fri May 19 17:26:52 UTC 2017
kill -USR1 6098
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6098 killed at Fri May 19 17:26:53 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Fri May 19 17:26:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:26:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6187 >/dev/null 2>/dev/null
selfserv with PID 6187 found at Fri May 19 17:26:53 UTC 2017
selfserv with PID 6187 started at Fri May 19 17:26:53 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:26:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:27:00 UTC 2017
ssl.sh: #1943: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6187 at Fri May 19 17:27:00 UTC 2017
kill -USR1 6187
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6187 killed at Fri May 19 17:27:00 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ----
selfserv starting at Fri May 19 17:27:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C023 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:27:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6260 >/dev/null 2>/dev/null
selfserv with PID 6260 found at Fri May 19 17:27:01 UTC 2017
selfserv with PID 6260 started at Fri May 19 17:27:01 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:27:01 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:27:08 UTC 2017
ssl.sh: #1944: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6260 at Fri May 19 17:27:08 UTC 2017
kill -USR1 6260
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6260 killed at Fri May 19 17:27:08 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) ----
selfserv starting at Fri May 19 17:27:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02B -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:27:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6334 >/dev/null 2>/dev/null
selfserv with PID 6334 found at Fri May 19 17:27:09 UTC 2017
selfserv with PID 6334 started at Fri May 19 17:27:09 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:27:09 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:27:16 UTC 2017
ssl.sh: #1945: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6334 at Fri May 19 17:27:16 UTC 2017
kill -USR1 6334
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6334 killed at Fri May 19 17:27:16 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Fri May 19 17:27:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:27:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6407 >/dev/null 2>/dev/null
selfserv with PID 6407 found at Fri May 19 17:27:17 UTC 2017
selfserv with PID 6407 started at Fri May 19 17:27:17 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:27:17 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:27:26 UTC 2017
ssl.sh: #1946: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6407 at Fri May 19 17:27:26 UTC 2017
kill -USR1 6407
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6407 killed at Fri May 19 17:27:26 UTC 2017
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Fri May 19 17:27:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C00E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:27:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6480 >/dev/null 2>/dev/null
selfserv with PID 6480 found at Fri May 19 17:27:26 UTC 2017
selfserv with PID 6480 started at Fri May 19 17:27:26 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:27:26 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:27:32 UTC 2017
ssl.sh: #1947: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6480 at Fri May 19 17:27:32 UTC 2017
kill -USR1 6480
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6480 killed at Fri May 19 17:27:32 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Fri May 19 17:27:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:27:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6553 >/dev/null 2>/dev/null
selfserv with PID 6553 found at Fri May 19 17:27:33 UTC 2017
selfserv with PID 6553 started at Fri May 19 17:27:33 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:27:33 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:27:35 UTC 2017
ssl.sh: #1948: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6553 at Fri May 19 17:27:35 UTC 2017
kill -USR1 6553
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6553 killed at Fri May 19 17:27:35 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 ----
selfserv starting at Fri May 19 17:27:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C027 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:27:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6628 >/dev/null 2>/dev/null
selfserv with PID 6628 found at Fri May 19 17:27:35 UTC 2017
selfserv with PID 6628 started at Fri May 19 17:27:35 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:27:35 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:27:37 UTC 2017
ssl.sh: #1949: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6628 at Fri May 19 17:27:37 UTC 2017
kill -USR1 6628
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6628 killed at Fri May 19 17:27:37 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 GCM ----
selfserv starting at Fri May 19 17:27:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02F -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:27:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6702 >/dev/null 2>/dev/null
selfserv with PID 6702 found at Fri May 19 17:27:37 UTC 2017
selfserv with PID 6702 started at Fri May 19 17:27:37 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:27:37 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:27:39 UTC 2017
ssl.sh: #1950: Stress TLS  ECDHE-RSA   AES 128 GCM produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6702 at Fri May 19 17:27:39 UTC 2017
kill -USR1 6702
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6702 killed at Fri May 19 17:27:39 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Fri May 19 17:27:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:27:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6779 >/dev/null 2>/dev/null
selfserv with PID 6779 found at Fri May 19 17:27:40 UTC 2017
selfserv with PID 6779 started at Fri May 19 17:27:40 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:27:40 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:27:42 UTC 2017
ssl.sh: #1951: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6779 at Fri May 19 17:27:42 UTC 2017
kill -USR1 6779
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6779 killed at Fri May 19 17:27:42 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Fri May 19 17:27:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:27:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6853 >/dev/null 2>/dev/null
selfserv with PID 6853 found at Fri May 19 17:27:42 UTC 2017
selfserv with PID 6853 started at Fri May 19 17:27:42 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:27:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 17:27:43 UTC 2017
ssl.sh: #1952: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6853 at Fri May 19 17:27:43 UTC 2017
kill -USR1 6853
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6853 killed at Fri May 19 17:27:43 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 17:27:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:27:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6942 >/dev/null 2>/dev/null
selfserv with PID 6942 found at Fri May 19 17:27:44 UTC 2017
selfserv with PID 6942 started at Fri May 19 17:27:44 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:27:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 17:27:46 UTC 2017
ssl.sh: #1953: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6942 at Fri May 19 17:27:46 UTC 2017
kill -USR1 6942
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6942 killed at Fri May 19 17:27:46 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Fri May 19 17:27:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:27:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7015 >/dev/null 2>/dev/null
selfserv with PID 7015 found at Fri May 19 17:27:46 UTC 2017
selfserv with PID 7015 started at Fri May 19 17:27:46 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:27:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:27:47 UTC 2017
ssl.sh: #1954: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7015 at Fri May 19 17:27:48 UTC 2017
kill -USR1 7015
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7015 killed at Fri May 19 17:27:48 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 17:27:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:27:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7089 >/dev/null 2>/dev/null
selfserv with PID 7089 found at Fri May 19 17:27:48 UTC 2017
selfserv with PID 7089 started at Fri May 19 17:27:48 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:27:48 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 17:27:50 UTC 2017
ssl.sh: #1955: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7089 at Fri May 19 17:27:50 UTC 2017
kill -USR1 7089
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7089 killed at Fri May 19 17:27:50 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 17:27:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:27:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7162 >/dev/null 2>/dev/null
selfserv with PID 7162 found at Fri May 19 17:27:50 UTC 2017
selfserv with PID 7162 started at Fri May 19 17:27:51 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n TestUser-ecmixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:27:51 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 17:27:52 UTC 2017
ssl.sh: #1956: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7162 at Fri May 19 17:27:52 UTC 2017
kill -USR1 7162
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7162 killed at Fri May 19 17:27:52 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Fri May 19 17:27:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:27:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7235 >/dev/null 2>/dev/null
selfserv with PID 7235 found at Fri May 19 17:27:53 UTC 2017
selfserv with PID 7235 started at Fri May 19 17:27:53 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:27:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:27:54 UTC 2017
ssl.sh: #1957: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7235 at Fri May 19 17:27:54 UTC 2017
kill -USR1 7235
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7235 killed at Fri May 19 17:27:54 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Fri May 19 17:27:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:27:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7309 >/dev/null 2>/dev/null
selfserv with PID 7309 found at Fri May 19 17:27:54 UTC 2017
selfserv with PID 7309 started at Fri May 19 17:27:54 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:27:54 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 17:27:55 UTC 2017
ssl.sh: #1958: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7309 at Fri May 19 17:27:55 UTC 2017
kill -USR1 7309
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7309 killed at Fri May 19 17:27:55 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ----
selfserv starting at Fri May 19 17:27:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0016 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:27:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7398 >/dev/null 2>/dev/null
selfserv with PID 7398 found at Fri May 19 17:27:56 UTC 2017
selfserv with PID 7398 started at Fri May 19 17:27:56 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:27:56 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:28:01 UTC 2017
ssl.sh: #1959: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7398 at Fri May 19 17:28:02 UTC 2017
kill -USR1 7398
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7398 killed at Fri May 19 17:28:02 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ----
selfserv starting at Fri May 19 17:28:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0033 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:28:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7471 >/dev/null 2>/dev/null
selfserv with PID 7471 found at Fri May 19 17:28:02 UTC 2017
selfserv with PID 7471 started at Fri May 19 17:28:02 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:28:02 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:28:04 UTC 2017
ssl.sh: #1960: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7471 at Fri May 19 17:28:04 UTC 2017
kill -USR1 7471
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7471 killed at Fri May 19 17:28:04 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Fri May 19 17:28:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0039 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:28:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7545 >/dev/null 2>/dev/null
selfserv with PID 7545 found at Fri May 19 17:28:04 UTC 2017
selfserv with PID 7545 started at Fri May 19 17:28:04 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:28:04 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:28:10 UTC 2017
ssl.sh: #1961: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7545 at Fri May 19 17:28:10 UTC 2017
kill -USR1 7545
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7545 killed at Fri May 19 17:28:10 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ----
selfserv starting at Fri May 19 17:28:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0040 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:28:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7618 >/dev/null 2>/dev/null
selfserv with PID 7618 found at Fri May 19 17:28:10 UTC 2017
selfserv with PID 7618 started at Fri May 19 17:28:10 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:28:10 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:28:17 UTC 2017
ssl.sh: #1962: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7618 at Fri May 19 17:28:17 UTC 2017
kill -USR1 7618
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7618 killed at Fri May 19 17:28:17 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Fri May 19 17:28:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0038 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:28:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7701 >/dev/null 2>/dev/null
selfserv with PID 7701 found at Fri May 19 17:28:18 UTC 2017
selfserv with PID 7701 started at Fri May 19 17:28:18 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:28:18 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 17:29:22 UTC 2017
ssl.sh: #1963: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7701 at Fri May 19 17:29:22 UTC 2017
kill -USR1 7701
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7701 killed at Fri May 19 17:29:22 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ----
selfserv starting at Fri May 19 17:29:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006A -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:29:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8115 >/dev/null 2>/dev/null
selfserv with PID 8115 found at Fri May 19 17:29:23 UTC 2017
selfserv with PID 8115 started at Fri May 19 17:29:23 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:29:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 17:30:26 UTC 2017
ssl.sh: #1964: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8115 at Fri May 19 17:30:26 UTC 2017
kill -USR1 8115
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8115 killed at Fri May 19 17:30:26 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ----
selfserv starting at Fri May 19 17:30:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006B -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:30:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8207 >/dev/null 2>/dev/null
selfserv with PID 8207 found at Fri May 19 17:30:26 UTC 2017
selfserv with PID 8207 started at Fri May 19 17:30:26 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:30:26 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:30:32 UTC 2017
ssl.sh: #1965: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8207 at Fri May 19 17:30:32 UTC 2017
kill -USR1 8207
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8207 killed at Fri May 19 17:30:32 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ----
selfserv starting at Fri May 19 17:30:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:30:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8280 >/dev/null 2>/dev/null
selfserv with PID 8280 found at Fri May 19 17:30:32 UTC 2017
selfserv with PID 8280 started at Fri May 19 17:30:32 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:30:32 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:30:38 UTC 2017
ssl.sh: #1966: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8280 at Fri May 19 17:30:38 UTC 2017
kill -USR1 8280
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8280 killed at Fri May 19 17:30:38 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ----
selfserv starting at Fri May 19 17:30:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009F -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:30:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8353 >/dev/null 2>/dev/null
selfserv with PID 8353 found at Fri May 19 17:30:38 UTC 2017
selfserv with PID 8353 started at Fri May 19 17:30:38 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:30:38 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:30:44 UTC 2017
ssl.sh: #1967: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8353 at Fri May 19 17:30:44 UTC 2017
kill -USR1 8353
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8353 killed at Fri May 19 17:30:44 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 17:30:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:30:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8442 >/dev/null 2>/dev/null
selfserv with PID 8442 found at Fri May 19 17:30:45 UTC 2017
selfserv with PID 8442 started at Fri May 19 17:30:45 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:30:45 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:30:55 UTC 2017
ssl.sh: #1968: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8442 at Fri May 19 17:30:55 UTC 2017
kill -USR1 8442
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8442 killed at Fri May 19 17:30:55 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Fri May 19 17:30:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:30:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8517 >/dev/null 2>/dev/null
selfserv with PID 8517 found at Fri May 19 17:30:55 UTC 2017
selfserv with PID 8517 started at Fri May 19 17:30:55 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n TestUser-dsamixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:30:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:30:58 UTC 2017
ssl.sh: #1969: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8517 at Fri May 19 17:30:58 UTC 2017
kill -USR1 8517
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8517 killed at Fri May 19 17:30:58 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Fri May 19 17:30:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:30:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8608 >/dev/null 2>/dev/null
selfserv with PID 8608 found at Fri May 19 17:30:58 UTC 2017
selfserv with PID 8608 started at Fri May 19 17:30:58 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:30:58 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 17:32:32 UTC 2017
ssl.sh: #1970: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8608 at Fri May 19 17:32:32 UTC 2017
kill -USR1 8608
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8608 killed at Fri May 19 17:32:32 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Fri May 19 17:32:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:32:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8681 >/dev/null 2>/dev/null
selfserv with PID 8681 found at Fri May 19 17:32:32 UTC 2017
selfserv with PID 8681 started at Fri May 19 17:32:32 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:32:32 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 17:34:08 UTC 2017
ssl.sh: #1971: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8681 at Fri May 19 17:34:08 UTC 2017
kill -USR1 8681
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8681 killed at Fri May 19 17:34:08 UTC 2017
ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client normal  - with ECC ===============================
selfserv starting at Fri May 19 17:34:08 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:34:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:08 UTC 2017
selfserv with PID 9019 started at Fri May 19 17:34:08 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1972: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1973: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1974: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1975: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1976: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1977: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1978: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1979: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1980: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1981: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1982: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1983: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1984: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1985: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1986: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1987: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1988: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1989: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1990: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1991: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1992: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1993: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1994: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1995: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1996: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1997: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1998: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1999: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2000: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2001: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2002: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2003: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2004: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2005: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2006: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2007: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2008: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2009: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2010: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2011: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2012: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2013: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2014: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2015: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2016: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2017: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2018: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2019: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2020: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2021: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2022: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2023: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2024: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2025: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2026: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2027: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2028: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2029: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2030: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2031: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2032: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2033: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2034: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2035: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2036: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2037: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2038: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2039: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2040: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2041: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2042: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2043: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2044: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2045: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2046: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2047: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2048: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2049: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9019 >/dev/null 2>/dev/null
selfserv with PID 9019 found at Fri May 19 17:34:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2050: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 9019 at Fri May 19 17:34:34 UTC 2017
kill -USR1 9019
selfserv: 0 cache hits; 79 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9019 killed at Fri May 19 17:34:34 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:34:34 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:34:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10909 >/dev/null 2>/dev/null
selfserv with PID 10909 found at Fri May 19 17:34:34 UTC 2017
selfserv with PID 10909 started at Fri May 19 17:34:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2051: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 10909 >/dev/null 2>/dev/null
selfserv with PID 10909 found at Fri May 19 17:34:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2052: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10909 >/dev/null 2>/dev/null
selfserv with PID 10909 found at Fri May 19 17:34:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2053: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10909 >/dev/null 2>/dev/null
selfserv with PID 10909 found at Fri May 19 17:34:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2054: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10909 >/dev/null 2>/dev/null
selfserv with PID 10909 found at Fri May 19 17:34:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2055: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 10909 at Fri May 19 17:34:35 UTC 2017
kill -USR1 10909
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10909 killed at Fri May 19 17:34:36 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:34:36 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:34:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11047 >/dev/null 2>/dev/null
selfserv with PID 11047 found at Fri May 19 17:34:36 UTC 2017
selfserv with PID 11047 started at Fri May 19 17:34:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2056: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 11047 >/dev/null 2>/dev/null
selfserv with PID 11047 found at Fri May 19 17:34:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2057: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11047 >/dev/null 2>/dev/null
selfserv with PID 11047 found at Fri May 19 17:34:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2058: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11047 >/dev/null 2>/dev/null
selfserv with PID 11047 found at Fri May 19 17:34:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2059: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11047 >/dev/null 2>/dev/null
selfserv with PID 11047 found at Fri May 19 17:34:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2060: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 11047 >/dev/null 2>/dev/null
selfserv with PID 11047 found at Fri May 19 17:34:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2061: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 11047 >/dev/null 2>/dev/null
selfserv with PID 11047 found at Fri May 19 17:34:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2062: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11047 >/dev/null 2>/dev/null
selfserv with PID 11047 found at Fri May 19 17:34:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2063: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11047 >/dev/null 2>/dev/null
selfserv with PID 11047 found at Fri May 19 17:34:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2064: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11047 >/dev/null 2>/dev/null
selfserv with PID 11047 found at Fri May 19 17:34:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2065: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 11047 >/dev/null 2>/dev/null
selfserv with PID 11047 found at Fri May 19 17:34:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2066: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 11047 >/dev/null 2>/dev/null
selfserv with PID 11047 found at Fri May 19 17:34:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2067: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11047 >/dev/null 2>/dev/null
selfserv with PID 11047 found at Fri May 19 17:34:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2068: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11047 >/dev/null 2>/dev/null
selfserv with PID 11047 found at Fri May 19 17:34:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2069: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11047 >/dev/null 2>/dev/null
selfserv with PID 11047 found at Fri May 19 17:34:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2070: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 11047 at Fri May 19 17:34:42 UTC 2017
kill -USR1 11047
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11047 killed at Fri May 19 17:34:42 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:34:42 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:34:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11400 >/dev/null 2>/dev/null
selfserv with PID 11400 found at Fri May 19 17:34:42 UTC 2017
selfserv with PID 11400 started at Fri May 19 17:34:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2071: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 11400 >/dev/null 2>/dev/null
selfserv with PID 11400 found at Fri May 19 17:34:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2072: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11400 >/dev/null 2>/dev/null
selfserv with PID 11400 found at Fri May 19 17:34:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2073: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11400 >/dev/null 2>/dev/null
selfserv with PID 11400 found at Fri May 19 17:34:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2074: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11400 >/dev/null 2>/dev/null
selfserv with PID 11400 found at Fri May 19 17:34:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2075: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 11400 at Fri May 19 17:34:44 UTC 2017
kill -USR1 11400
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11400 killed at Fri May 19 17:34:44 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:34:44 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:34:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11538 >/dev/null 2>/dev/null
selfserv with PID 11538 found at Fri May 19 17:34:44 UTC 2017
selfserv with PID 11538 started at Fri May 19 17:34:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2076: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 11538 >/dev/null 2>/dev/null
selfserv with PID 11538 found at Fri May 19 17:34:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2077: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11538 >/dev/null 2>/dev/null
selfserv with PID 11538 found at Fri May 19 17:34:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2078: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11538 >/dev/null 2>/dev/null
selfserv with PID 11538 found at Fri May 19 17:34:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2079: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11538 >/dev/null 2>/dev/null
selfserv with PID 11538 found at Fri May 19 17:34:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2080: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 11538 >/dev/null 2>/dev/null
selfserv with PID 11538 found at Fri May 19 17:34:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2081: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 11538 >/dev/null 2>/dev/null
selfserv with PID 11538 found at Fri May 19 17:34:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2082: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11538 >/dev/null 2>/dev/null
selfserv with PID 11538 found at Fri May 19 17:34:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2083: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11538 >/dev/null 2>/dev/null
selfserv with PID 11538 found at Fri May 19 17:34:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2084: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11538 >/dev/null 2>/dev/null
selfserv with PID 11538 found at Fri May 19 17:34:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2085: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 11538 >/dev/null 2>/dev/null
selfserv with PID 11538 found at Fri May 19 17:34:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2086: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 11538 >/dev/null 2>/dev/null
selfserv with PID 11538 found at Fri May 19 17:34:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2087: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11538 >/dev/null 2>/dev/null
selfserv with PID 11538 found at Fri May 19 17:34:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2088: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11538 >/dev/null 2>/dev/null
selfserv with PID 11538 found at Fri May 19 17:34:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2089: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11538 >/dev/null 2>/dev/null
selfserv with PID 11538 found at Fri May 19 17:34:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2090: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 11538 at Fri May 19 17:34:51 UTC 2017
kill -USR1 11538
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11538 killed at Fri May 19 17:34:51 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:34:51 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:34:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11891 >/dev/null 2>/dev/null
selfserv with PID 11891 found at Fri May 19 17:34:51 UTC 2017
selfserv with PID 11891 started at Fri May 19 17:34:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2091: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 11891 >/dev/null 2>/dev/null
selfserv with PID 11891 found at Fri May 19 17:34:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2092: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11891 >/dev/null 2>/dev/null
selfserv with PID 11891 found at Fri May 19 17:34:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2093: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11891 >/dev/null 2>/dev/null
selfserv with PID 11891 found at Fri May 19 17:34:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2094: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11891 >/dev/null 2>/dev/null
selfserv with PID 11891 found at Fri May 19 17:34:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2095: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 11891 at Fri May 19 17:34:53 UTC 2017
kill -USR1 11891
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11891 killed at Fri May 19 17:34:53 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:34:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:34:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12029 >/dev/null 2>/dev/null
selfserv with PID 12029 found at Fri May 19 17:34:53 UTC 2017
selfserv with PID 12029 started at Fri May 19 17:34:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2096: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 12029 >/dev/null 2>/dev/null
selfserv with PID 12029 found at Fri May 19 17:34:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2097: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 12029 >/dev/null 2>/dev/null
selfserv with PID 12029 found at Fri May 19 17:34:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2098: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 12029 >/dev/null 2>/dev/null
selfserv with PID 12029 found at Fri May 19 17:34:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2099: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 12029 >/dev/null 2>/dev/null
selfserv with PID 12029 found at Fri May 19 17:34:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2100: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 12029 >/dev/null 2>/dev/null
selfserv with PID 12029 found at Fri May 19 17:34:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2101: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 12029 >/dev/null 2>/dev/null
selfserv with PID 12029 found at Fri May 19 17:34:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2102: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 12029 >/dev/null 2>/dev/null
selfserv with PID 12029 found at Fri May 19 17:34:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2103: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 12029 >/dev/null 2>/dev/null
selfserv with PID 12029 found at Fri May 19 17:34:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2104: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 12029 >/dev/null 2>/dev/null
selfserv with PID 12029 found at Fri May 19 17:34:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2105: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 12029 >/dev/null 2>/dev/null
selfserv with PID 12029 found at Fri May 19 17:34:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2106: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 12029 >/dev/null 2>/dev/null
selfserv with PID 12029 found at Fri May 19 17:34:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2107: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 12029 >/dev/null 2>/dev/null
selfserv with PID 12029 found at Fri May 19 17:34:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2108: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 12029 >/dev/null 2>/dev/null
selfserv with PID 12029 found at Fri May 19 17:34:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2109: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 12029 >/dev/null 2>/dev/null
selfserv with PID 12029 found at Fri May 19 17:34:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2110: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12029 at Fri May 19 17:34:59 UTC 2017
kill -USR1 12029
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12029 killed at Fri May 19 17:34:59 UTC 2017
ssl.sh: SSL Client Authentication Extended Test - server bypass/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:34:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:34:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12430 >/dev/null 2>/dev/null
selfserv with PID 12430 found at Fri May 19 17:34:59 UTC 2017
selfserv with PID 12430 started at Fri May 19 17:34:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2111: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12430 at Fri May 19 17:35:00 UTC 2017
kill -USR1 12430
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12430 killed at Fri May 19 17:35:00 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Fri May 19 17:35:00 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12487 >/dev/null 2>/dev/null
selfserv with PID 12487 found at Fri May 19 17:35:00 UTC 2017
selfserv with PID 12487 started at Fri May 19 17:35:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2112: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12487 at Fri May 19 17:35:01 UTC 2017
kill -USR1 12487
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12487 killed at Fri May 19 17:35:02 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Fri May 19 17:35:02 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12553 >/dev/null 2>/dev/null
selfserv with PID 12553 found at Fri May 19 17:35:02 UTC 2017
selfserv with PID 12553 started at Fri May 19 17:35:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2113: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12553 at Fri May 19 17:35:03 UTC 2017
kill -USR1 12553
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12553 killed at Fri May 19 17:35:03 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:35:03 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12636 >/dev/null 2>/dev/null
selfserv with PID 12636 found at Fri May 19 17:35:03 UTC 2017
selfserv with PID 12636 started at Fri May 19 17:35:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2114: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12636 at Fri May 19 17:35:04 UTC 2017
kill -USR1 12636
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12636 killed at Fri May 19 17:35:04 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Fri May 19 17:35:05 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12693 >/dev/null 2>/dev/null
selfserv with PID 12693 found at Fri May 19 17:35:05 UTC 2017
selfserv with PID 12693 started at Fri May 19 17:35:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2115: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12693 at Fri May 19 17:35:06 UTC 2017
kill -USR1 12693
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12693 killed at Fri May 19 17:35:06 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Fri May 19 17:35:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12750 >/dev/null 2>/dev/null
selfserv with PID 12750 found at Fri May 19 17:35:06 UTC 2017
selfserv with PID 12750 started at Fri May 19 17:35:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2116: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12750 at Fri May 19 17:35:07 UTC 2017
kill -USR1 12750
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12750 killed at Fri May 19 17:35:07 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:35:07 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12807 >/dev/null 2>/dev/null
selfserv with PID 12807 found at Fri May 19 17:35:07 UTC 2017
selfserv with PID 12807 started at Fri May 19 17:35:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2117: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12807 at Fri May 19 17:35:08 UTC 2017
kill -USR1 12807
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12807 killed at Fri May 19 17:35:08 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Fri May 19 17:35:08 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12864 >/dev/null 2>/dev/null
selfserv with PID 12864 found at Fri May 19 17:35:08 UTC 2017
selfserv with PID 12864 started at Fri May 19 17:35:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2118: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12864 at Fri May 19 17:35:09 UTC 2017
kill -USR1 12864
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12864 killed at Fri May 19 17:35:09 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Fri May 19 17:35:10 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12929 >/dev/null 2>/dev/null
selfserv with PID 12929 found at Fri May 19 17:35:10 UTC 2017
selfserv with PID 12929 started at Fri May 19 17:35:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2119: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12929 at Fri May 19 17:35:11 UTC 2017
kill -USR1 12929
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12929 killed at Fri May 19 17:35:11 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:35:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12986 >/dev/null 2>/dev/null
selfserv with PID 12986 found at Fri May 19 17:35:11 UTC 2017
selfserv with PID 12986 started at Fri May 19 17:35:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2120: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12986 at Fri May 19 17:35:12 UTC 2017
kill -USR1 12986
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12986 killed at Fri May 19 17:35:12 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Fri May 19 17:35:12 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13043 >/dev/null 2>/dev/null
selfserv with PID 13043 found at Fri May 19 17:35:12 UTC 2017
selfserv with PID 13043 started at Fri May 19 17:35:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2121: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13043 at Fri May 19 17:35:13 UTC 2017
kill -USR1 13043
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13043 killed at Fri May 19 17:35:13 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Fri May 19 17:35:13 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13100 >/dev/null 2>/dev/null
selfserv with PID 13100 found at Fri May 19 17:35:13 UTC 2017
selfserv with PID 13100 started at Fri May 19 17:35:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2122: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13100 at Fri May 19 17:35:14 UTC 2017
kill -USR1 13100
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13100 killed at Fri May 19 17:35:14 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:35:15 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13157 >/dev/null 2>/dev/null
selfserv with PID 13157 found at Fri May 19 17:35:15 UTC 2017
selfserv with PID 13157 started at Fri May 19 17:35:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2123: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13157 at Fri May 19 17:35:16 UTC 2017
kill -USR1 13157
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13157 killed at Fri May 19 17:35:16 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:35:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13221 >/dev/null 2>/dev/null
selfserv with PID 13221 found at Fri May 19 17:35:16 UTC 2017
selfserv with PID 13221 started at Fri May 19 17:35:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2124: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13221 at Fri May 19 17:35:18 UTC 2017
kill -USR1 13221
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13221 killed at Fri May 19 17:35:18 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:35:18 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13278 >/dev/null 2>/dev/null
selfserv with PID 13278 found at Fri May 19 17:35:18 UTC 2017
selfserv with PID 13278 started at Fri May 19 17:35:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2125: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13278 at Fri May 19 17:35:19 UTC 2017
kill -USR1 13278
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13278 killed at Fri May 19 17:35:19 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:35:19 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13335 >/dev/null 2>/dev/null
selfserv with PID 13335 found at Fri May 19 17:35:19 UTC 2017
selfserv with PID 13335 started at Fri May 19 17:35:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2126: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13335 at Fri May 19 17:35:21 UTC 2017
kill -USR1 13335
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13335 killed at Fri May 19 17:35:21 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:35:21 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13392 >/dev/null 2>/dev/null
selfserv with PID 13392 found at Fri May 19 17:35:21 UTC 2017
selfserv with PID 13392 started at Fri May 19 17:35:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2127: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13392 at Fri May 19 17:35:22 UTC 2017
kill -USR1 13392
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13392 killed at Fri May 19 17:35:22 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:35:22 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13449 >/dev/null 2>/dev/null
selfserv with PID 13449 found at Fri May 19 17:35:23 UTC 2017
selfserv with PID 13449 started at Fri May 19 17:35:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2128: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13449 at Fri May 19 17:35:24 UTC 2017
kill -USR1 13449
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13449 killed at Fri May 19 17:35:24 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:35:24 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13506 >/dev/null 2>/dev/null
selfserv with PID 13506 found at Fri May 19 17:35:24 UTC 2017
selfserv with PID 13506 started at Fri May 19 17:35:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2129: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13506 at Fri May 19 17:35:26 UTC 2017
kill -USR1 13506
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13506 killed at Fri May 19 17:35:26 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:35:26 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13563 >/dev/null 2>/dev/null
selfserv with PID 13563 found at Fri May 19 17:35:26 UTC 2017
selfserv with PID 13563 started at Fri May 19 17:35:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2130: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13563 at Fri May 19 17:35:27 UTC 2017
kill -USR1 13563
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13563 killed at Fri May 19 17:35:27 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:35:27 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13620 >/dev/null 2>/dev/null
selfserv with PID 13620 found at Fri May 19 17:35:27 UTC 2017
selfserv with PID 13620 started at Fri May 19 17:35:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2131: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13620 at Fri May 19 17:35:29 UTC 2017
kill -USR1 13620
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13620 killed at Fri May 19 17:35:29 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:35:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13677 >/dev/null 2>/dev/null
selfserv with PID 13677 found at Fri May 19 17:35:29 UTC 2017
selfserv with PID 13677 started at Fri May 19 17:35:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2132: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13677 at Fri May 19 17:35:30 UTC 2017
kill -USR1 13677
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13677 killed at Fri May 19 17:35:30 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:35:30 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13734 >/dev/null 2>/dev/null
selfserv with PID 13734 found at Fri May 19 17:35:31 UTC 2017
selfserv with PID 13734 started at Fri May 19 17:35:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2133: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13734 at Fri May 19 17:35:32 UTC 2017
kill -USR1 13734
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13734 killed at Fri May 19 17:35:32 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:35:32 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13791 >/dev/null 2>/dev/null
selfserv with PID 13791 found at Fri May 19 17:35:32 UTC 2017
selfserv with PID 13791 started at Fri May 19 17:35:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2134: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13791 at Fri May 19 17:35:33 UTC 2017
kill -USR1 13791
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13791 killed at Fri May 19 17:35:33 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:35:34 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13848 >/dev/null 2>/dev/null
selfserv with PID 13848 found at Fri May 19 17:35:34 UTC 2017
selfserv with PID 13848 started at Fri May 19 17:35:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2135: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13848 at Fri May 19 17:35:35 UTC 2017
kill -USR1 13848
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13848 killed at Fri May 19 17:35:35 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:35:35 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13905 >/dev/null 2>/dev/null
selfserv with PID 13905 found at Fri May 19 17:35:35 UTC 2017
selfserv with PID 13905 started at Fri May 19 17:35:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2136: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13905 at Fri May 19 17:35:36 UTC 2017
kill -USR1 13905
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13905 killed at Fri May 19 17:35:36 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:35:36 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13962 >/dev/null 2>/dev/null
selfserv with PID 13962 found at Fri May 19 17:35:36 UTC 2017
selfserv with PID 13962 started at Fri May 19 17:35:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2137: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13962 at Fri May 19 17:35:38 UTC 2017
kill -USR1 13962
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13962 killed at Fri May 19 17:35:38 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:35:38 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14019 >/dev/null 2>/dev/null
selfserv with PID 14019 found at Fri May 19 17:35:38 UTC 2017
selfserv with PID 14019 started at Fri May 19 17:35:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2138: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14019 at Fri May 19 17:35:39 UTC 2017
kill -USR1 14019
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14019 killed at Fri May 19 17:35:39 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:35:39 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14076 >/dev/null 2>/dev/null
selfserv with PID 14076 found at Fri May 19 17:35:39 UTC 2017
selfserv with PID 14076 started at Fri May 19 17:35:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2139: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14076 at Fri May 19 17:35:40 UTC 2017
kill -USR1 14076
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14076 killed at Fri May 19 17:35:40 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:35:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14133 >/dev/null 2>/dev/null
selfserv with PID 14133 found at Fri May 19 17:35:41 UTC 2017
selfserv with PID 14133 started at Fri May 19 17:35:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2140: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14133 at Fri May 19 17:35:42 UTC 2017
kill -USR1 14133
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14133 killed at Fri May 19 17:35:42 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:35:42 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Fri May 19 17:35:42 UTC 2017
selfserv with PID 14205 started at Fri May 19 17:35:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2141: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14205 at Fri May 19 17:35:43 UTC 2017
kill -USR1 14205
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14205 killed at Fri May 19 17:35:43 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:35:43 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14262 >/dev/null 2>/dev/null
selfserv with PID 14262 found at Fri May 19 17:35:44 UTC 2017
selfserv with PID 14262 started at Fri May 19 17:35:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2142: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14262 at Fri May 19 17:35:45 UTC 2017
kill -USR1 14262
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14262 killed at Fri May 19 17:35:45 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:35:45 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14319 >/dev/null 2>/dev/null
selfserv with PID 14319 found at Fri May 19 17:35:45 UTC 2017
selfserv with PID 14319 started at Fri May 19 17:35:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2143: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14319 at Fri May 19 17:35:46 UTC 2017
kill -USR1 14319
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14319 killed at Fri May 19 17:35:46 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:35:46 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14376 >/dev/null 2>/dev/null
selfserv with PID 14376 found at Fri May 19 17:35:46 UTC 2017
selfserv with PID 14376 started at Fri May 19 17:35:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2144: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14376 at Fri May 19 17:35:48 UTC 2017
kill -USR1 14376
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14376 killed at Fri May 19 17:35:48 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:35:48 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14433 >/dev/null 2>/dev/null
selfserv with PID 14433 found at Fri May 19 17:35:48 UTC 2017
selfserv with PID 14433 started at Fri May 19 17:35:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2145: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14433 at Fri May 19 17:35:49 UTC 2017
kill -USR1 14433
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14433 killed at Fri May 19 17:35:49 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:35:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14490 >/dev/null 2>/dev/null
selfserv with PID 14490 found at Fri May 19 17:35:49 UTC 2017
selfserv with PID 14490 started at Fri May 19 17:35:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2146: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14490 at Fri May 19 17:35:50 UTC 2017
kill -USR1 14490
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14490 killed at Fri May 19 17:35:50 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:35:50 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14547 >/dev/null 2>/dev/null
selfserv with PID 14547 found at Fri May 19 17:35:51 UTC 2017
selfserv with PID 14547 started at Fri May 19 17:35:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2147: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14547 at Fri May 19 17:35:51 UTC 2017
kill -USR1 14547
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14547 killed at Fri May 19 17:35:51 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:35:52 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14604 >/dev/null 2>/dev/null
selfserv with PID 14604 found at Fri May 19 17:35:52 UTC 2017
selfserv with PID 14604 started at Fri May 19 17:35:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2148: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14604 at Fri May 19 17:35:53 UTC 2017
kill -USR1 14604
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14604 killed at Fri May 19 17:35:53 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:35:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14661 >/dev/null 2>/dev/null
selfserv with PID 14661 found at Fri May 19 17:35:53 UTC 2017
selfserv with PID 14661 started at Fri May 19 17:35:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2149: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14661 at Fri May 19 17:35:54 UTC 2017
kill -USR1 14661
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14661 killed at Fri May 19 17:35:54 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:35:55 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14718 >/dev/null 2>/dev/null
selfserv with PID 14718 found at Fri May 19 17:35:55 UTC 2017
selfserv with PID 14718 started at Fri May 19 17:35:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2150: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14718 at Fri May 19 17:35:56 UTC 2017
kill -USR1 14718
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14718 killed at Fri May 19 17:35:56 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:35:56 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14775 >/dev/null 2>/dev/null
selfserv with PID 14775 found at Fri May 19 17:35:56 UTC 2017
selfserv with PID 14775 started at Fri May 19 17:35:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2151: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14775 at Fri May 19 17:35:58 UTC 2017
kill -USR1 14775
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14775 killed at Fri May 19 17:35:58 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:35:58 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:35:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14832 >/dev/null 2>/dev/null
selfserv with PID 14832 found at Fri May 19 17:35:58 UTC 2017
selfserv with PID 14832 started at Fri May 19 17:35:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2152: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14832 at Fri May 19 17:35:59 UTC 2017
kill -USR1 14832
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14832 killed at Fri May 19 17:36:00 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:36:00 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14889 >/dev/null 2>/dev/null
selfserv with PID 14889 found at Fri May 19 17:36:00 UTC 2017
selfserv with PID 14889 started at Fri May 19 17:36:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2153: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14889 at Fri May 19 17:36:01 UTC 2017
kill -USR1 14889
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14889 killed at Fri May 19 17:36:01 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:36:01 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14946 >/dev/null 2>/dev/null
selfserv with PID 14946 found at Fri May 19 17:36:01 UTC 2017
selfserv with PID 14946 started at Fri May 19 17:36:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2154: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14946 at Fri May 19 17:36:03 UTC 2017
kill -USR1 14946
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14946 killed at Fri May 19 17:36:03 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:36:03 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15003 >/dev/null 2>/dev/null
selfserv with PID 15003 found at Fri May 19 17:36:03 UTC 2017
selfserv with PID 15003 started at Fri May 19 17:36:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2155: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15003 at Fri May 19 17:36:04 UTC 2017
kill -USR1 15003
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15003 killed at Fri May 19 17:36:04 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:36:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15060 >/dev/null 2>/dev/null
selfserv with PID 15060 found at Fri May 19 17:36:05 UTC 2017
selfserv with PID 15060 started at Fri May 19 17:36:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15060 at Fri May 19 17:36:06 UTC 2017
kill -USR1 15060
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15060 killed at Fri May 19 17:36:06 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:36:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15117 >/dev/null 2>/dev/null
selfserv with PID 15117 found at Fri May 19 17:36:06 UTC 2017
selfserv with PID 15117 started at Fri May 19 17:36:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15117 at Fri May 19 17:36:07 UTC 2017
kill -USR1 15117
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15117 killed at Fri May 19 17:36:07 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:36:08 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15174 >/dev/null 2>/dev/null
selfserv with PID 15174 found at Fri May 19 17:36:08 UTC 2017
selfserv with PID 15174 started at Fri May 19 17:36:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2158: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15174 at Fri May 19 17:36:09 UTC 2017
kill -USR1 15174
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15174 killed at Fri May 19 17:36:09 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:36:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15231 >/dev/null 2>/dev/null
selfserv with PID 15231 found at Fri May 19 17:36:09 UTC 2017
selfserv with PID 15231 started at Fri May 19 17:36:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2159: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15231 at Fri May 19 17:36:11 UTC 2017
kill -USR1 15231
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15231 killed at Fri May 19 17:36:11 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:36:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15288 >/dev/null 2>/dev/null
selfserv with PID 15288 found at Fri May 19 17:36:11 UTC 2017
selfserv with PID 15288 started at Fri May 19 17:36:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2160: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15288 at Fri May 19 17:36:12 UTC 2017
kill -USR1 15288
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15288 killed at Fri May 19 17:36:12 UTC 2017
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test Extended Test - server bypass/client normal  - with ECC ===============================
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Fri May 19 17:36:13 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15433 >/dev/null 2>/dev/null
selfserv with PID 15433 found at Fri May 19 17:36:13 UTC 2017
selfserv with PID 15433 started at Fri May 19 17:36:13 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 1000 -C c -V ssl3:ssl3 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:36:13 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:36:15 UTC 2017
ssl.sh: #2161: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 15433 at Fri May 19 17:36:15 UTC 2017
kill -USR1 15433
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15433 killed at Fri May 19 17:36:15 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Fri May 19 17:36:15 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15507 >/dev/null 2>/dev/null
selfserv with PID 15507 found at Fri May 19 17:36:15 UTC 2017
selfserv with PID 15507 started at Fri May 19 17:36:15 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 1000 -C c \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:36:15 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:36:17 UTC 2017
ssl.sh: #2162: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 15507 at Fri May 19 17:36:17 UTC 2017
kill -USR1 15507
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15507 killed at Fri May 19 17:36:17 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Fri May 19 17:36:17 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15581 >/dev/null 2>/dev/null
selfserv with PID 15581 found at Fri May 19 17:36:17 UTC 2017
selfserv with PID 15581 started at Fri May 19 17:36:17 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 1000 -C c -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:36:17 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:36:19 UTC 2017
ssl.sh: #2163: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 15581 at Fri May 19 17:36:19 UTC 2017
kill -USR1 15581
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15581 killed at Fri May 19 17:36:19 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Fri May 19 17:36:20 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15655 >/dev/null 2>/dev/null
selfserv with PID 15655 found at Fri May 19 17:36:20 UTC 2017
selfserv with PID 15655 started at Fri May 19 17:36:20 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:36:20 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:36:22 UTC 2017
ssl.sh: #2164: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 15655 at Fri May 19 17:36:22 UTC 2017
kill -USR1 15655
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15655 killed at Fri May 19 17:36:22 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Fri May 19 17:36:22 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15729 >/dev/null 2>/dev/null
selfserv with PID 15729 found at Fri May 19 17:36:22 UTC 2017
selfserv with PID 15729 started at Fri May 19 17:36:22 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C c -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:36:22 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:36:24 UTC 2017
ssl.sh: #2165: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 15729 at Fri May 19 17:36:24 UTC 2017
kill -USR1 15729
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15729 killed at Fri May 19 17:36:24 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Fri May 19 17:36:25 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15803 >/dev/null 2>/dev/null
selfserv with PID 15803 found at Fri May 19 17:36:25 UTC 2017
selfserv with PID 15803 started at Fri May 19 17:36:25 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:36:25 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:36:27 UTC 2017
ssl.sh: #2166: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 15803 at Fri May 19 17:36:27 UTC 2017
kill -USR1 15803
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15803 killed at Fri May 19 17:36:27 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Fri May 19 17:36:27 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15877 >/dev/null 2>/dev/null
selfserv with PID 15877 found at Fri May 19 17:36:27 UTC 2017
selfserv with PID 15877 started at Fri May 19 17:36:28 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:36:28 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:36:30 UTC 2017
ssl.sh: #2167: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 15877 at Fri May 19 17:36:30 UTC 2017
kill -USR1 15877
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15877 killed at Fri May 19 17:36:30 UTC 2017
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Fri May 19 17:36:30 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15968 >/dev/null 2>/dev/null
selfserv with PID 15968 found at Fri May 19 17:36:30 UTC 2017
selfserv with PID 15968 started at Fri May 19 17:36:30 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:36:30 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:36:35 UTC 2017
ssl.sh: #2168: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 15968 at Fri May 19 17:36:36 UTC 2017
kill -USR1 15968
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15968 killed at Fri May 19 17:36:36 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Fri May 19 17:36:36 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16041 >/dev/null 2>/dev/null
selfserv with PID 16041 found at Fri May 19 17:36:36 UTC 2017
selfserv with PID 16041 started at Fri May 19 17:36:36 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 100 -C c -N -n ExtendedSSLUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:36:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:36:41 UTC 2017
ssl.sh: #2169: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16041 at Fri May 19 17:36:41 UTC 2017
kill -USR1 16041
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16041 killed at Fri May 19 17:36:41 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Fri May 19 17:36:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16114 >/dev/null 2>/dev/null
selfserv with PID 16114 found at Fri May 19 17:36:41 UTC 2017
selfserv with PID 16114 started at Fri May 19 17:36:41 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:36:41 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 17:36:42 UTC 2017
ssl.sh: #2170: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16114 at Fri May 19 17:36:42 UTC 2017
kill -USR1 16114
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16114 killed at Fri May 19 17:36:42 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Fri May 19 17:36:42 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16188 >/dev/null 2>/dev/null
selfserv with PID 16188 found at Fri May 19 17:36:42 UTC 2017
selfserv with PID 16188 started at Fri May 19 17:36:42 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:36:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:36:44 UTC 2017
ssl.sh: #2171: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16188 at Fri May 19 17:36:44 UTC 2017
kill -USR1 16188
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16188 killed at Fri May 19 17:36:44 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Fri May 19 17:36:44 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16262 >/dev/null 2>/dev/null
selfserv with PID 16262 found at Fri May 19 17:36:44 UTC 2017
selfserv with PID 16262 started at Fri May 19 17:36:44 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:36:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:36:45 UTC 2017
ssl.sh: #2172: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16262 at Fri May 19 17:36:45 UTC 2017
kill -USR1 16262
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16262 killed at Fri May 19 17:36:45 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Fri May 19 17:36:45 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16336 >/dev/null 2>/dev/null
selfserv with PID 16336 found at Fri May 19 17:36:45 UTC 2017
selfserv with PID 16336 started at Fri May 19 17:36:45 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:36:45 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 17:36:46 UTC 2017
ssl.sh: #2173: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16336 at Fri May 19 17:36:46 UTC 2017
kill -USR1 16336
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16336 killed at Fri May 19 17:36:47 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Fri May 19 17:36:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16410 >/dev/null 2>/dev/null
selfserv with PID 16410 found at Fri May 19 17:36:47 UTC 2017
selfserv with PID 16410 started at Fri May 19 17:36:47 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:36:47 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 17:36:48 UTC 2017
ssl.sh: #2174: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16410 at Fri May 19 17:36:48 UTC 2017
kill -USR1 16410
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16410 killed at Fri May 19 17:36:48 UTC 2017
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Fri May 19 17:36:48 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:36:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16503 >/dev/null 2>/dev/null
selfserv with PID 16503 found at Fri May 19 17:36:48 UTC 2017
selfserv with PID 16503 started at Fri May 19 17:36:48 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:36:48 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:37:00 UTC 2017
ssl.sh: #2175: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16503 at Fri May 19 17:37:00 UTC 2017
kill -USR1 16503
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16503 killed at Fri May 19 17:37:00 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ----
selfserv starting at Fri May 19 17:37:00 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C023 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:37:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16576 >/dev/null 2>/dev/null
selfserv with PID 16576 found at Fri May 19 17:37:00 UTC 2017
selfserv with PID 16576 started at Fri May 19 17:37:00 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:37:00 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:37:11 UTC 2017
ssl.sh: #2176: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16576 at Fri May 19 17:37:11 UTC 2017
kill -USR1 16576
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16576 killed at Fri May 19 17:37:11 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) ----
selfserv starting at Fri May 19 17:37:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02B -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:37:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16649 >/dev/null 2>/dev/null
selfserv with PID 16649 found at Fri May 19 17:37:12 UTC 2017
selfserv with PID 16649 started at Fri May 19 17:37:12 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:37:12 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:37:23 UTC 2017
ssl.sh: #2177: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16649 at Fri May 19 17:37:23 UTC 2017
kill -USR1 16649
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16649 killed at Fri May 19 17:37:23 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Fri May 19 17:37:23 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:37:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16723 >/dev/null 2>/dev/null
selfserv with PID 16723 found at Fri May 19 17:37:23 UTC 2017
selfserv with PID 16723 started at Fri May 19 17:37:23 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:37:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:37:34 UTC 2017
ssl.sh: #2178: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16723 at Fri May 19 17:37:34 UTC 2017
kill -USR1 16723
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16723 killed at Fri May 19 17:37:34 UTC 2017
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Fri May 19 17:37:34 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C00E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:37:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16796 >/dev/null 2>/dev/null
selfserv with PID 16796 found at Fri May 19 17:37:34 UTC 2017
selfserv with PID 16796 started at Fri May 19 17:37:34 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:37:34 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:37:36 UTC 2017
ssl.sh: #2179: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16796 at Fri May 19 17:37:36 UTC 2017
kill -USR1 16796
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16796 killed at Fri May 19 17:37:37 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Fri May 19 17:37:37 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:37:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16869 >/dev/null 2>/dev/null
selfserv with PID 16869 found at Fri May 19 17:37:37 UTC 2017
selfserv with PID 16869 started at Fri May 19 17:37:37 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:37:37 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:37:39 UTC 2017
ssl.sh: #2180: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16869 at Fri May 19 17:37:39 UTC 2017
kill -USR1 16869
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16869 killed at Fri May 19 17:37:39 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 ----
selfserv starting at Fri May 19 17:37:39 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C027 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:37:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16943 >/dev/null 2>/dev/null
selfserv with PID 16943 found at Fri May 19 17:37:39 UTC 2017
selfserv with PID 16943 started at Fri May 19 17:37:39 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:37:39 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:37:41 UTC 2017
ssl.sh: #2181: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16943 at Fri May 19 17:37:41 UTC 2017
kill -USR1 16943
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16943 killed at Fri May 19 17:37:42 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 GCM ----
selfserv starting at Fri May 19 17:37:42 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02F -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:37:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17018 >/dev/null 2>/dev/null
selfserv with PID 17018 found at Fri May 19 17:37:42 UTC 2017
selfserv with PID 17018 started at Fri May 19 17:37:42 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:37:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:37:44 UTC 2017
ssl.sh: #2182: Stress TLS  ECDHE-RSA   AES 128 GCM produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17018 at Fri May 19 17:37:44 UTC 2017
kill -USR1 17018
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17018 killed at Fri May 19 17:37:44 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Fri May 19 17:37:44 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:37:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17092 >/dev/null 2>/dev/null
selfserv with PID 17092 found at Fri May 19 17:37:44 UTC 2017
selfserv with PID 17092 started at Fri May 19 17:37:44 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:37:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:37:46 UTC 2017
ssl.sh: #2183: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17092 at Fri May 19 17:37:47 UTC 2017
kill -USR1 17092
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17092 killed at Fri May 19 17:37:47 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Fri May 19 17:37:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:37:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17166 >/dev/null 2>/dev/null
selfserv with PID 17166 found at Fri May 19 17:37:47 UTC 2017
selfserv with PID 17166 started at Fri May 19 17:37:47 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:37:47 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 17:37:48 UTC 2017
ssl.sh: #2184: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17166 at Fri May 19 17:37:48 UTC 2017
kill -USR1 17166
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17166 killed at Fri May 19 17:37:48 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 17:37:48 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:37:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17255 >/dev/null 2>/dev/null
selfserv with PID 17255 found at Fri May 19 17:37:48 UTC 2017
selfserv with PID 17255 started at Fri May 19 17:37:49 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:37:49 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 17:37:51 UTC 2017
ssl.sh: #2185: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17255 at Fri May 19 17:37:51 UTC 2017
kill -USR1 17255
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17255 killed at Fri May 19 17:37:51 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Fri May 19 17:37:52 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:37:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17328 >/dev/null 2>/dev/null
selfserv with PID 17328 found at Fri May 19 17:37:52 UTC 2017
selfserv with PID 17328 started at Fri May 19 17:37:52 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:37:52 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:37:53 UTC 2017
ssl.sh: #2186: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17328 at Fri May 19 17:37:53 UTC 2017
kill -USR1 17328
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17328 killed at Fri May 19 17:37:53 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 17:37:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:37:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17402 >/dev/null 2>/dev/null
selfserv with PID 17402 found at Fri May 19 17:37:53 UTC 2017
selfserv with PID 17402 started at Fri May 19 17:37:53 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:37:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 17:37:56 UTC 2017
ssl.sh: #2187: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17402 at Fri May 19 17:37:56 UTC 2017
kill -USR1 17402
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17402 killed at Fri May 19 17:37:56 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 17:37:56 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:37:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17476 >/dev/null 2>/dev/null
selfserv with PID 17476 found at Fri May 19 17:37:56 UTC 2017
selfserv with PID 17476 started at Fri May 19 17:37:56 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:37:57 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 17:37:57 UTC 2017
ssl.sh: #2188: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17476 at Fri May 19 17:37:58 UTC 2017
kill -USR1 17476
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17476 killed at Fri May 19 17:37:58 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Fri May 19 17:37:58 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:37:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17549 >/dev/null 2>/dev/null
selfserv with PID 17549 found at Fri May 19 17:37:58 UTC 2017
selfserv with PID 17549 started at Fri May 19 17:37:58 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:37:58 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:37:59 UTC 2017
ssl.sh: #2189: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17549 at Fri May 19 17:37:59 UTC 2017
kill -USR1 17549
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17549 killed at Fri May 19 17:37:59 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Fri May 19 17:37:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:37:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17623 >/dev/null 2>/dev/null
selfserv with PID 17623 found at Fri May 19 17:37:59 UTC 2017
selfserv with PID 17623 started at Fri May 19 17:37:59 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:37:59 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 17:38:01 UTC 2017
ssl.sh: #2190: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17623 at Fri May 19 17:38:01 UTC 2017
kill -USR1 17623
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17623 killed at Fri May 19 17:38:01 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ----
selfserv starting at Fri May 19 17:38:01 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0016 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:38:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17716 >/dev/null 2>/dev/null
selfserv with PID 17716 found at Fri May 19 17:38:01 UTC 2017
selfserv with PID 17716 started at Fri May 19 17:38:01 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:38:01 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:38:07 UTC 2017
ssl.sh: #2191: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17716 at Fri May 19 17:38:07 UTC 2017
kill -USR1 17716
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17716 killed at Fri May 19 17:38:07 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ----
selfserv starting at Fri May 19 17:38:07 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0033 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:38:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17801 >/dev/null 2>/dev/null
selfserv with PID 17801 found at Fri May 19 17:38:07 UTC 2017
selfserv with PID 17801 started at Fri May 19 17:38:07 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:38:08 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:38:10 UTC 2017
ssl.sh: #2192: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17801 at Fri May 19 17:38:10 UTC 2017
kill -USR1 17801
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17801 killed at Fri May 19 17:38:10 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Fri May 19 17:38:10 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0039 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:38:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17875 >/dev/null 2>/dev/null
selfserv with PID 17875 found at Fri May 19 17:38:10 UTC 2017
selfserv with PID 17875 started at Fri May 19 17:38:10 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:38:10 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:38:16 UTC 2017
ssl.sh: #2193: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17875 at Fri May 19 17:38:16 UTC 2017
kill -USR1 17875
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17875 killed at Fri May 19 17:38:16 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ----
selfserv starting at Fri May 19 17:38:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0040 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:38:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17948 >/dev/null 2>/dev/null
selfserv with PID 17948 found at Fri May 19 17:38:16 UTC 2017
selfserv with PID 17948 started at Fri May 19 17:38:16 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:38:16 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:38:26 UTC 2017
ssl.sh: #2194: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17948 at Fri May 19 17:38:26 UTC 2017
kill -USR1 17948
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17948 killed at Fri May 19 17:38:26 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Fri May 19 17:38:26 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0038 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:38:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18031 >/dev/null 2>/dev/null
selfserv with PID 18031 found at Fri May 19 17:38:26 UTC 2017
selfserv with PID 18031 started at Fri May 19 17:38:26 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:38:26 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 17:39:56 UTC 2017
ssl.sh: #2195: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18031 at Fri May 19 17:39:56 UTC 2017
kill -USR1 18031
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18031 killed at Fri May 19 17:39:56 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ----
selfserv starting at Fri May 19 17:39:56 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006A -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:39:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18444 >/dev/null 2>/dev/null
selfserv with PID 18444 found at Fri May 19 17:39:56 UTC 2017
selfserv with PID 18444 started at Fri May 19 17:39:56 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:39:56 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 17:41:25 UTC 2017
ssl.sh: #2196: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18444 at Fri May 19 17:41:25 UTC 2017
kill -USR1 18444
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18444 killed at Fri May 19 17:41:25 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ----
selfserv starting at Fri May 19 17:41:25 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006B -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:41:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18536 >/dev/null 2>/dev/null
selfserv with PID 18536 found at Fri May 19 17:41:25 UTC 2017
selfserv with PID 18536 started at Fri May 19 17:41:25 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:41:25 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:41:31 UTC 2017
ssl.sh: #2197: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18536 at Fri May 19 17:41:31 UTC 2017
kill -USR1 18536
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18536 killed at Fri May 19 17:41:31 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ----
selfserv starting at Fri May 19 17:41:31 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:41:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18609 >/dev/null 2>/dev/null
selfserv with PID 18609 found at Fri May 19 17:41:31 UTC 2017
selfserv with PID 18609 started at Fri May 19 17:41:31 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:41:31 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:41:37 UTC 2017
ssl.sh: #2198: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18609 at Fri May 19 17:41:37 UTC 2017
kill -USR1 18609
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18609 killed at Fri May 19 17:41:37 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ----
selfserv starting at Fri May 19 17:41:38 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009F -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:41:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18682 >/dev/null 2>/dev/null
selfserv with PID 18682 found at Fri May 19 17:41:38 UTC 2017
selfserv with PID 18682 started at Fri May 19 17:41:38 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:41:38 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:41:44 UTC 2017
ssl.sh: #2199: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18682 at Fri May 19 17:41:44 UTC 2017
kill -USR1 18682
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18682 killed at Fri May 19 17:41:44 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 17:41:44 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:41:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18770 >/dev/null 2>/dev/null
selfserv with PID 18770 found at Fri May 19 17:41:44 UTC 2017
selfserv with PID 18770 started at Fri May 19 17:41:44 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:41:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:41:59 UTC 2017
ssl.sh: #2200: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18770 at Fri May 19 17:41:59 UTC 2017
kill -USR1 18770
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18770 killed at Fri May 19 17:41:59 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Fri May 19 17:42:00 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:42:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18843 >/dev/null 2>/dev/null
selfserv with PID 18843 found at Fri May 19 17:42:00 UTC 2017
selfserv with PID 18843 started at Fri May 19 17:42:00 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:42:00 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:42:02 UTC 2017
ssl.sh: #2201: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18843 at Fri May 19 17:42:02 UTC 2017
kill -USR1 18843
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18843 killed at Fri May 19 17:42:02 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Fri May 19 17:42:02 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:42:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18932 >/dev/null 2>/dev/null
selfserv with PID 18932 found at Fri May 19 17:42:02 UTC 2017
selfserv with PID 18932 started at Fri May 19 17:42:02 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:42:02 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 17:44:30 UTC 2017
ssl.sh: #2202: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18932 at Fri May 19 17:44:30 UTC 2017
kill -USR1 18932
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18932 killed at Fri May 19 17:44:30 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Fri May 19 17:44:30 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:44:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19335 >/dev/null 2>/dev/null
selfserv with PID 19335 found at Fri May 19 17:44:30 UTC 2017
selfserv with PID 19335 started at Fri May 19 17:44:30 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:44:30 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 17:46:57 UTC 2017
ssl.sh: #2203: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19335 at Fri May 19 17:46:57 UTC 2017
kill -USR1 19335
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19335 killed at Fri May 19 17:46:57 UTC 2017
ssl.sh: SSL Cipher Coverage  - server normal/client bypass  - with ECC ===============================
selfserv starting at Fri May 19 17:46:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:46:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:46:58 UTC 2017
selfserv with PID 19422 started at Fri May 19 17:46:58 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:46:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2204: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:46:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2205: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:46:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2206: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:46:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2207: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:46:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2208: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:46:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2209: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2210: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2211: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2212: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2213: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2214: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2215: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2216: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2217: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2218: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2219: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2220: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2221: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2222: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2223: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2224: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2225: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2226: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2227: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2228: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2229: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2230: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2231: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2232: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2233: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2234: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2235: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2236: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2237: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2238: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2239: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2240: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2241: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2242: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2243: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2244: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2245: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2246: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2247: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2248: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2249: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2250: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2251: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2252: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2253: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2254: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2255: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2256: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2257: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2258: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2259: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2260: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2261: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2262: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2263: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2264: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2265: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2266: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2267: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2268: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2269: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2270: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2271: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2272: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2273: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2274: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2275: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2276: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2277: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2278: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2279: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2280: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2281: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19422 >/dev/null 2>/dev/null
selfserv with PID 19422 found at Fri May 19 17:47:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2282: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 19422 at Fri May 19 17:47:22 UTC 2017
kill -USR1 19422
selfserv: 0 cache hits; 79 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19422 killed at Fri May 19 17:47:22 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:47:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:47:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21258 >/dev/null 2>/dev/null
selfserv with PID 21258 found at Fri May 19 17:47:22 UTC 2017
selfserv with PID 21258 started at Fri May 19 17:47:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2283: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21258 >/dev/null 2>/dev/null
selfserv with PID 21258 found at Fri May 19 17:47:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2284: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21258 >/dev/null 2>/dev/null
selfserv with PID 21258 found at Fri May 19 17:47:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2285: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21258 >/dev/null 2>/dev/null
selfserv with PID 21258 found at Fri May 19 17:47:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2286: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21258 >/dev/null 2>/dev/null
selfserv with PID 21258 found at Fri May 19 17:47:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2287: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 21258 at Fri May 19 17:47:24 UTC 2017
kill -USR1 21258
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21258 killed at Fri May 19 17:47:24 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:47:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:47:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21396 >/dev/null 2>/dev/null
selfserv with PID 21396 found at Fri May 19 17:47:24 UTC 2017
selfserv with PID 21396 started at Fri May 19 17:47:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2288: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21396 >/dev/null 2>/dev/null
selfserv with PID 21396 found at Fri May 19 17:47:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2289: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21396 >/dev/null 2>/dev/null
selfserv with PID 21396 found at Fri May 19 17:47:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2290: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21396 >/dev/null 2>/dev/null
selfserv with PID 21396 found at Fri May 19 17:47:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2291: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21396 >/dev/null 2>/dev/null
selfserv with PID 21396 found at Fri May 19 17:47:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2292: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 21396 >/dev/null 2>/dev/null
selfserv with PID 21396 found at Fri May 19 17:47:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2293: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 21396 >/dev/null 2>/dev/null
selfserv with PID 21396 found at Fri May 19 17:47:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2294: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21396 >/dev/null 2>/dev/null
selfserv with PID 21396 found at Fri May 19 17:47:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2295: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21396 >/dev/null 2>/dev/null
selfserv with PID 21396 found at Fri May 19 17:47:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2296: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21396 >/dev/null 2>/dev/null
selfserv with PID 21396 found at Fri May 19 17:47:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2297: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 21396 >/dev/null 2>/dev/null
selfserv with PID 21396 found at Fri May 19 17:47:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2298: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 21396 >/dev/null 2>/dev/null
selfserv with PID 21396 found at Fri May 19 17:47:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2299: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21396 >/dev/null 2>/dev/null
selfserv with PID 21396 found at Fri May 19 17:47:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2300: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21396 >/dev/null 2>/dev/null
selfserv with PID 21396 found at Fri May 19 17:47:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2301: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21396 >/dev/null 2>/dev/null
selfserv with PID 21396 found at Fri May 19 17:47:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2302: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 21396 at Fri May 19 17:47:31 UTC 2017
kill -USR1 21396
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21396 killed at Fri May 19 17:47:31 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:47:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:47:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21749 >/dev/null 2>/dev/null
selfserv with PID 21749 found at Fri May 19 17:47:31 UTC 2017
selfserv with PID 21749 started at Fri May 19 17:47:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2303: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21749 >/dev/null 2>/dev/null
selfserv with PID 21749 found at Fri May 19 17:47:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2304: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21749 >/dev/null 2>/dev/null
selfserv with PID 21749 found at Fri May 19 17:47:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2305: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21749 >/dev/null 2>/dev/null
selfserv with PID 21749 found at Fri May 19 17:47:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2306: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21749 >/dev/null 2>/dev/null
selfserv with PID 21749 found at Fri May 19 17:47:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2307: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 21749 at Fri May 19 17:47:33 UTC 2017
kill -USR1 21749
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21749 killed at Fri May 19 17:47:33 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:47:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:47:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21887 >/dev/null 2>/dev/null
selfserv with PID 21887 found at Fri May 19 17:47:33 UTC 2017
selfserv with PID 21887 started at Fri May 19 17:47:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2308: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21887 >/dev/null 2>/dev/null
selfserv with PID 21887 found at Fri May 19 17:47:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2309: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21887 >/dev/null 2>/dev/null
selfserv with PID 21887 found at Fri May 19 17:47:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2310: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21887 >/dev/null 2>/dev/null
selfserv with PID 21887 found at Fri May 19 17:47:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2311: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21887 >/dev/null 2>/dev/null
selfserv with PID 21887 found at Fri May 19 17:47:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2312: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 21887 >/dev/null 2>/dev/null
selfserv with PID 21887 found at Fri May 19 17:47:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2313: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 21887 >/dev/null 2>/dev/null
selfserv with PID 21887 found at Fri May 19 17:47:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2314: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21887 >/dev/null 2>/dev/null
selfserv with PID 21887 found at Fri May 19 17:47:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2315: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21887 >/dev/null 2>/dev/null
selfserv with PID 21887 found at Fri May 19 17:47:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2316: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21887 >/dev/null 2>/dev/null
selfserv with PID 21887 found at Fri May 19 17:47:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2317: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 21887 >/dev/null 2>/dev/null
selfserv with PID 21887 found at Fri May 19 17:47:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2318: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 21887 >/dev/null 2>/dev/null
selfserv with PID 21887 found at Fri May 19 17:47:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2319: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21887 >/dev/null 2>/dev/null
selfserv with PID 21887 found at Fri May 19 17:47:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2320: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21887 >/dev/null 2>/dev/null
selfserv with PID 21887 found at Fri May 19 17:47:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2321: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21887 >/dev/null 2>/dev/null
selfserv with PID 21887 found at Fri May 19 17:47:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2322: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 21887 at Fri May 19 17:47:39 UTC 2017
kill -USR1 21887
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21887 killed at Fri May 19 17:47:39 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:47:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:47:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22242 >/dev/null 2>/dev/null
selfserv with PID 22242 found at Fri May 19 17:47:39 UTC 2017
selfserv with PID 22242 started at Fri May 19 17:47:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2323: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22242 >/dev/null 2>/dev/null
selfserv with PID 22242 found at Fri May 19 17:47:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2324: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22242 >/dev/null 2>/dev/null
selfserv with PID 22242 found at Fri May 19 17:47:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2325: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22242 >/dev/null 2>/dev/null
selfserv with PID 22242 found at Fri May 19 17:47:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2326: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22242 >/dev/null 2>/dev/null
selfserv with PID 22242 found at Fri May 19 17:47:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2327: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22242 at Fri May 19 17:47:42 UTC 2017
kill -USR1 22242
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22242 killed at Fri May 19 17:47:42 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:47:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:47:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22380 >/dev/null 2>/dev/null
selfserv with PID 22380 found at Fri May 19 17:47:42 UTC 2017
selfserv with PID 22380 started at Fri May 19 17:47:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2328: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22380 >/dev/null 2>/dev/null
selfserv with PID 22380 found at Fri May 19 17:47:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2329: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22380 >/dev/null 2>/dev/null
selfserv with PID 22380 found at Fri May 19 17:47:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2330: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22380 >/dev/null 2>/dev/null
selfserv with PID 22380 found at Fri May 19 17:47:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2331: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22380 >/dev/null 2>/dev/null
selfserv with PID 22380 found at Fri May 19 17:47:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2332: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 22380 >/dev/null 2>/dev/null
selfserv with PID 22380 found at Fri May 19 17:47:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2333: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 22380 >/dev/null 2>/dev/null
selfserv with PID 22380 found at Fri May 19 17:47:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2334: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 22380 >/dev/null 2>/dev/null
selfserv with PID 22380 found at Fri May 19 17:47:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2335: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 22380 >/dev/null 2>/dev/null
selfserv with PID 22380 found at Fri May 19 17:47:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2336: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 22380 >/dev/null 2>/dev/null
selfserv with PID 22380 found at Fri May 19 17:47:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2337: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 22380 >/dev/null 2>/dev/null
selfserv with PID 22380 found at Fri May 19 17:47:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2338: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 22380 >/dev/null 2>/dev/null
selfserv with PID 22380 found at Fri May 19 17:47:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2339: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 22380 >/dev/null 2>/dev/null
selfserv with PID 22380 found at Fri May 19 17:47:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2340: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 22380 >/dev/null 2>/dev/null
selfserv with PID 22380 found at Fri May 19 17:47:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2341: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 22380 >/dev/null 2>/dev/null
selfserv with PID 22380 found at Fri May 19 17:47:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2 -B -s \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2342: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22380 at Fri May 19 17:47:47 UTC 2017
kill -USR1 22380
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22380 killed at Fri May 19 17:47:47 UTC 2017
ssl.sh: SSL Client Authentication  - server normal/client bypass  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:47:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:47:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22781 >/dev/null 2>/dev/null
selfserv with PID 22781 found at Fri May 19 17:47:48 UTC 2017
selfserv with PID 22781 started at Fri May 19 17:47:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2343: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22781 at Fri May 19 17:47:49 UTC 2017
kill -USR1 22781
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22781 killed at Fri May 19 17:47:49 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Fri May 19 17:47:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:47:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22838 >/dev/null 2>/dev/null
selfserv with PID 22838 found at Fri May 19 17:47:49 UTC 2017
selfserv with PID 22838 started at Fri May 19 17:47:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2344: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22838 at Fri May 19 17:47:50 UTC 2017
kill -USR1 22838
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22838 killed at Fri May 19 17:47:50 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Fri May 19 17:47:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:47:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22895 >/dev/null 2>/dev/null
selfserv with PID 22895 found at Fri May 19 17:47:50 UTC 2017
selfserv with PID 22895 started at Fri May 19 17:47:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2345: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22895 at Fri May 19 17:47:51 UTC 2017
kill -USR1 22895
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22895 killed at Fri May 19 17:47:52 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:47:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:47:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22952 >/dev/null 2>/dev/null
selfserv with PID 22952 found at Fri May 19 17:47:52 UTC 2017
selfserv with PID 22952 started at Fri May 19 17:47:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2346: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22952 at Fri May 19 17:47:53 UTC 2017
kill -USR1 22952
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22952 killed at Fri May 19 17:47:53 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Fri May 19 17:47:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:47:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23009 >/dev/null 2>/dev/null
selfserv with PID 23009 found at Fri May 19 17:47:53 UTC 2017
selfserv with PID 23009 started at Fri May 19 17:47:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2347: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23009 at Fri May 19 17:47:54 UTC 2017
kill -USR1 23009
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23009 killed at Fri May 19 17:47:54 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Fri May 19 17:47:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:47:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23066 >/dev/null 2>/dev/null
selfserv with PID 23066 found at Fri May 19 17:47:54 UTC 2017
selfserv with PID 23066 started at Fri May 19 17:47:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2348: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23066 at Fri May 19 17:47:55 UTC 2017
kill -USR1 23066
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23066 killed at Fri May 19 17:47:55 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:47:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:47:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23123 >/dev/null 2>/dev/null
selfserv with PID 23123 found at Fri May 19 17:47:55 UTC 2017
selfserv with PID 23123 started at Fri May 19 17:47:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2349: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23123 at Fri May 19 17:47:56 UTC 2017
kill -USR1 23123
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23123 killed at Fri May 19 17:47:56 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Fri May 19 17:47:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:47:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23180 >/dev/null 2>/dev/null
selfserv with PID 23180 found at Fri May 19 17:47:57 UTC 2017
selfserv with PID 23180 started at Fri May 19 17:47:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2350: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23180 at Fri May 19 17:47:57 UTC 2017
kill -USR1 23180
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23180 killed at Fri May 19 17:47:57 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Fri May 19 17:47:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:47:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23237 >/dev/null 2>/dev/null
selfserv with PID 23237 found at Fri May 19 17:47:58 UTC 2017
selfserv with PID 23237 started at Fri May 19 17:47:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2351: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23237 at Fri May 19 17:47:59 UTC 2017
kill -USR1 23237
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23237 killed at Fri May 19 17:47:59 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:47:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:47:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23294 >/dev/null 2>/dev/null
selfserv with PID 23294 found at Fri May 19 17:47:59 UTC 2017
selfserv with PID 23294 started at Fri May 19 17:47:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2352: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23294 at Fri May 19 17:48:00 UTC 2017
kill -USR1 23294
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23294 killed at Fri May 19 17:48:00 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Fri May 19 17:48:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23351 >/dev/null 2>/dev/null
selfserv with PID 23351 found at Fri May 19 17:48:00 UTC 2017
selfserv with PID 23351 started at Fri May 19 17:48:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2353: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23351 at Fri May 19 17:48:01 UTC 2017
kill -USR1 23351
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23351 killed at Fri May 19 17:48:01 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Fri May 19 17:48:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23408 >/dev/null 2>/dev/null
selfserv with PID 23408 found at Fri May 19 17:48:01 UTC 2017
selfserv with PID 23408 started at Fri May 19 17:48:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2354: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23408 at Fri May 19 17:48:02 UTC 2017
kill -USR1 23408
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23408 killed at Fri May 19 17:48:02 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:48:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23465 >/dev/null 2>/dev/null
selfserv with PID 23465 found at Fri May 19 17:48:02 UTC 2017
selfserv with PID 23465 started at Fri May 19 17:48:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2355: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23465 at Fri May 19 17:48:03 UTC 2017
kill -USR1 23465
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23465 killed at Fri May 19 17:48:03 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:48:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23522 >/dev/null 2>/dev/null
selfserv with PID 23522 found at Fri May 19 17:48:04 UTC 2017
selfserv with PID 23522 started at Fri May 19 17:48:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2356: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23522 at Fri May 19 17:48:05 UTC 2017
kill -USR1 23522
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23522 killed at Fri May 19 17:48:05 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:48:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23579 >/dev/null 2>/dev/null
selfserv with PID 23579 found at Fri May 19 17:48:05 UTC 2017
selfserv with PID 23579 started at Fri May 19 17:48:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2357: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23579 at Fri May 19 17:48:06 UTC 2017
kill -USR1 23579
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23579 killed at Fri May 19 17:48:06 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:48:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23636 >/dev/null 2>/dev/null
selfserv with PID 23636 found at Fri May 19 17:48:07 UTC 2017
selfserv with PID 23636 started at Fri May 19 17:48:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2358: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23636 at Fri May 19 17:48:08 UTC 2017
kill -USR1 23636
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23636 killed at Fri May 19 17:48:08 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:48:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23693 >/dev/null 2>/dev/null
selfserv with PID 23693 found at Fri May 19 17:48:08 UTC 2017
selfserv with PID 23693 started at Fri May 19 17:48:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2359: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23693 at Fri May 19 17:48:09 UTC 2017
kill -USR1 23693
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23693 killed at Fri May 19 17:48:09 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:48:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23750 >/dev/null 2>/dev/null
selfserv with PID 23750 found at Fri May 19 17:48:09 UTC 2017
selfserv with PID 23750 started at Fri May 19 17:48:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2360: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23750 at Fri May 19 17:48:11 UTC 2017
kill -USR1 23750
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23750 killed at Fri May 19 17:48:11 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:48:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23807 >/dev/null 2>/dev/null
selfserv with PID 23807 found at Fri May 19 17:48:11 UTC 2017
selfserv with PID 23807 started at Fri May 19 17:48:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2361: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23807 at Fri May 19 17:48:12 UTC 2017
kill -USR1 23807
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23807 killed at Fri May 19 17:48:12 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:48:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23864 >/dev/null 2>/dev/null
selfserv with PID 23864 found at Fri May 19 17:48:12 UTC 2017
selfserv with PID 23864 started at Fri May 19 17:48:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2362: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23864 at Fri May 19 17:48:14 UTC 2017
kill -USR1 23864
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23864 killed at Fri May 19 17:48:14 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:48:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23921 >/dev/null 2>/dev/null
selfserv with PID 23921 found at Fri May 19 17:48:14 UTC 2017
selfserv with PID 23921 started at Fri May 19 17:48:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2363: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23921 at Fri May 19 17:48:16 UTC 2017
kill -USR1 23921
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23921 killed at Fri May 19 17:48:16 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:48:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23978 >/dev/null 2>/dev/null
selfserv with PID 23978 found at Fri May 19 17:48:16 UTC 2017
selfserv with PID 23978 started at Fri May 19 17:48:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2364: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23978 at Fri May 19 17:48:17 UTC 2017
kill -USR1 23978
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23978 killed at Fri May 19 17:48:17 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:48:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24035 >/dev/null 2>/dev/null
selfserv with PID 24035 found at Fri May 19 17:48:18 UTC 2017
selfserv with PID 24035 started at Fri May 19 17:48:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2365: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24035 at Fri May 19 17:48:19 UTC 2017
kill -USR1 24035
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24035 killed at Fri May 19 17:48:19 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:48:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24092 >/dev/null 2>/dev/null
selfserv with PID 24092 found at Fri May 19 17:48:19 UTC 2017
selfserv with PID 24092 started at Fri May 19 17:48:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2366: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24092 at Fri May 19 17:48:21 UTC 2017
kill -USR1 24092
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24092 killed at Fri May 19 17:48:21 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:48:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24149 >/dev/null 2>/dev/null
selfserv with PID 24149 found at Fri May 19 17:48:21 UTC 2017
selfserv with PID 24149 started at Fri May 19 17:48:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2367: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24149 at Fri May 19 17:48:22 UTC 2017
kill -USR1 24149
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24149 killed at Fri May 19 17:48:22 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:48:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24206 >/dev/null 2>/dev/null
selfserv with PID 24206 found at Fri May 19 17:48:22 UTC 2017
selfserv with PID 24206 started at Fri May 19 17:48:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2368: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24206 at Fri May 19 17:48:23 UTC 2017
kill -USR1 24206
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24206 killed at Fri May 19 17:48:23 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:48:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24263 >/dev/null 2>/dev/null
selfserv with PID 24263 found at Fri May 19 17:48:23 UTC 2017
selfserv with PID 24263 started at Fri May 19 17:48:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2369: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24263 at Fri May 19 17:48:25 UTC 2017
kill -USR1 24263
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24263 killed at Fri May 19 17:48:25 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:48:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24320 >/dev/null 2>/dev/null
selfserv with PID 24320 found at Fri May 19 17:48:25 UTC 2017
selfserv with PID 24320 started at Fri May 19 17:48:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2370: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24320 at Fri May 19 17:48:26 UTC 2017
kill -USR1 24320
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24320 killed at Fri May 19 17:48:26 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:48:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24377 >/dev/null 2>/dev/null
selfserv with PID 24377 found at Fri May 19 17:48:26 UTC 2017
selfserv with PID 24377 started at Fri May 19 17:48:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2371: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24377 at Fri May 19 17:48:27 UTC 2017
kill -USR1 24377
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24377 killed at Fri May 19 17:48:27 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:48:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24434 >/dev/null 2>/dev/null
selfserv with PID 24434 found at Fri May 19 17:48:27 UTC 2017
selfserv with PID 24434 started at Fri May 19 17:48:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2372: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24434 at Fri May 19 17:48:29 UTC 2017
kill -USR1 24434
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24434 killed at Fri May 19 17:48:29 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:48:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24506 >/dev/null 2>/dev/null
selfserv with PID 24506 found at Fri May 19 17:48:29 UTC 2017
selfserv with PID 24506 started at Fri May 19 17:48:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2373: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24506 at Fri May 19 17:48:30 UTC 2017
kill -USR1 24506
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24506 killed at Fri May 19 17:48:30 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:48:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24563 >/dev/null 2>/dev/null
selfserv with PID 24563 found at Fri May 19 17:48:30 UTC 2017
selfserv with PID 24563 started at Fri May 19 17:48:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2374: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24563 at Fri May 19 17:48:31 UTC 2017
kill -USR1 24563
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24563 killed at Fri May 19 17:48:31 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:48:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24620 >/dev/null 2>/dev/null
selfserv with PID 24620 found at Fri May 19 17:48:32 UTC 2017
selfserv with PID 24620 started at Fri May 19 17:48:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2375: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24620 at Fri May 19 17:48:33 UTC 2017
kill -USR1 24620
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24620 killed at Fri May 19 17:48:33 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:48:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24677 >/dev/null 2>/dev/null
selfserv with PID 24677 found at Fri May 19 17:48:33 UTC 2017
selfserv with PID 24677 started at Fri May 19 17:48:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2376: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24677 at Fri May 19 17:48:34 UTC 2017
kill -USR1 24677
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24677 killed at Fri May 19 17:48:34 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:48:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24734 >/dev/null 2>/dev/null
selfserv with PID 24734 found at Fri May 19 17:48:34 UTC 2017
selfserv with PID 24734 started at Fri May 19 17:48:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2377: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24734 at Fri May 19 17:48:35 UTC 2017
kill -USR1 24734
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24734 killed at Fri May 19 17:48:35 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:48:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24791 >/dev/null 2>/dev/null
selfserv with PID 24791 found at Fri May 19 17:48:35 UTC 2017
selfserv with PID 24791 started at Fri May 19 17:48:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2378: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24791 at Fri May 19 17:48:37 UTC 2017
kill -USR1 24791
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24791 killed at Fri May 19 17:48:37 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:48:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24848 >/dev/null 2>/dev/null
selfserv with PID 24848 found at Fri May 19 17:48:37 UTC 2017
selfserv with PID 24848 started at Fri May 19 17:48:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2379: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24848 at Fri May 19 17:48:38 UTC 2017
kill -USR1 24848
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24848 killed at Fri May 19 17:48:38 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:48:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24905 >/dev/null 2>/dev/null
selfserv with PID 24905 found at Fri May 19 17:48:38 UTC 2017
selfserv with PID 24905 started at Fri May 19 17:48:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2380: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24905 at Fri May 19 17:48:39 UTC 2017
kill -USR1 24905
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24905 killed at Fri May 19 17:48:39 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:48:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24962 >/dev/null 2>/dev/null
selfserv with PID 24962 found at Fri May 19 17:48:39 UTC 2017
selfserv with PID 24962 started at Fri May 19 17:48:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2381: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24962 at Fri May 19 17:48:41 UTC 2017
kill -USR1 24962
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24962 killed at Fri May 19 17:48:41 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:48:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25019 >/dev/null 2>/dev/null
selfserv with PID 25019 found at Fri May 19 17:48:41 UTC 2017
selfserv with PID 25019 started at Fri May 19 17:48:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2382: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25019 at Fri May 19 17:48:42 UTC 2017
kill -USR1 25019
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25019 killed at Fri May 19 17:48:42 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:48:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25076 >/dev/null 2>/dev/null
selfserv with PID 25076 found at Fri May 19 17:48:42 UTC 2017
selfserv with PID 25076 started at Fri May 19 17:48:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2383: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25076 at Fri May 19 17:48:44 UTC 2017
kill -USR1 25076
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25076 killed at Fri May 19 17:48:44 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:48:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25133 >/dev/null 2>/dev/null
selfserv with PID 25133 found at Fri May 19 17:48:44 UTC 2017
selfserv with PID 25133 started at Fri May 19 17:48:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2384: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25133 at Fri May 19 17:48:45 UTC 2017
kill -USR1 25133
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25133 killed at Fri May 19 17:48:45 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:48:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25190 >/dev/null 2>/dev/null
selfserv with PID 25190 found at Fri May 19 17:48:45 UTC 2017
selfserv with PID 25190 started at Fri May 19 17:48:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2385: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25190 at Fri May 19 17:48:47 UTC 2017
kill -USR1 25190
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25190 killed at Fri May 19 17:48:47 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:48:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25247 >/dev/null 2>/dev/null
selfserv with PID 25247 found at Fri May 19 17:48:47 UTC 2017
selfserv with PID 25247 started at Fri May 19 17:48:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2386: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25247 at Fri May 19 17:48:49 UTC 2017
kill -USR1 25247
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25247 killed at Fri May 19 17:48:49 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:48:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25304 >/dev/null 2>/dev/null
selfserv with PID 25304 found at Fri May 19 17:48:49 UTC 2017
selfserv with PID 25304 started at Fri May 19 17:48:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2387: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25304 at Fri May 19 17:48:50 UTC 2017
kill -USR1 25304
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25304 killed at Fri May 19 17:48:50 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:48:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25361 >/dev/null 2>/dev/null
selfserv with PID 25361 found at Fri May 19 17:48:50 UTC 2017
selfserv with PID 25361 started at Fri May 19 17:48:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2388: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25361 at Fri May 19 17:48:52 UTC 2017
kill -USR1 25361
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25361 killed at Fri May 19 17:48:52 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:48:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25418 >/dev/null 2>/dev/null
selfserv with PID 25418 found at Fri May 19 17:48:52 UTC 2017
selfserv with PID 25418 started at Fri May 19 17:48:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2389: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25418 at Fri May 19 17:48:53 UTC 2017
kill -USR1 25418
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25418 killed at Fri May 19 17:48:53 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:48:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25475 >/dev/null 2>/dev/null
selfserv with PID 25475 found at Fri May 19 17:48:54 UTC 2017
selfserv with PID 25475 started at Fri May 19 17:48:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25475 at Fri May 19 17:48:55 UTC 2017
kill -USR1 25475
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25475 killed at Fri May 19 17:48:55 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:48:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25558 >/dev/null 2>/dev/null
selfserv with PID 25558 found at Fri May 19 17:48:55 UTC 2017
selfserv with PID 25558 started at Fri May 19 17:48:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2391: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25558 at Fri May 19 17:48:56 UTC 2017
kill -USR1 25558
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25558 killed at Fri May 19 17:48:57 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:48:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25631 >/dev/null 2>/dev/null
selfserv with PID 25631 found at Fri May 19 17:48:57 UTC 2017
selfserv with PID 25631 started at Fri May 19 17:48:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2392: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25631 at Fri May 19 17:48:58 UTC 2017
kill -USR1 25631
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25631 killed at Fri May 19 17:48:58 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Fri May 19 17:48:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:48:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25747 >/dev/null 2>/dev/null
selfserv with PID 25747 found at Fri May 19 17:48:58 UTC 2017
selfserv with PID 25747 started at Fri May 19 17:48:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2393: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25747 at Fri May 19 17:49:00 UTC 2017
kill -USR1 25747
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25747 killed at Fri May 19 17:49:00 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Fri May 19 17:49:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25829 >/dev/null 2>/dev/null
selfserv with PID 25829 found at Fri May 19 17:49:00 UTC 2017
selfserv with PID 25829 started at Fri May 19 17:49:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2394: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25829 at Fri May 19 17:49:01 UTC 2017
kill -USR1 25829
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25829 killed at Fri May 19 17:49:01 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Fri May 19 17:49:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25981 >/dev/null 2>/dev/null
selfserv with PID 25981 found at Fri May 19 17:49:01 UTC 2017
selfserv with PID 25981 started at Fri May 19 17:49:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2395: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25981 at Fri May 19 17:49:02 UTC 2017
kill -USR1 25981
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25981 killed at Fri May 19 17:49:02 UTC 2017
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Fri May 19 17:49:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26085 >/dev/null 2>/dev/null
selfserv with PID 26085 found at Fri May 19 17:49:02 UTC 2017
selfserv with PID 26085 started at Fri May 19 17:49:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2396: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26085 at Fri May 19 17:49:03 UTC 2017
kill -USR1 26085
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26085 killed at Fri May 19 17:49:03 UTC 2017
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Fri May 19 17:49:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26199 >/dev/null 2>/dev/null
selfserv with PID 26199 found at Fri May 19 17:49:04 UTC 2017
selfserv with PID 26199 started at Fri May 19 17:49:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:ssl3 -c v -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2397: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26199 at Fri May 19 17:49:04 UTC 2017
kill -USR1 26199
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26199 killed at Fri May 19 17:49:04 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Fri May 19 17:49:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26266 >/dev/null 2>/dev/null
selfserv with PID 26266 found at Fri May 19 17:49:05 UTC 2017
selfserv with PID 26266 started at Fri May 19 17:49:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2398: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26266 at Fri May 19 17:49:06 UTC 2017
kill -USR1 26266
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26266 killed at Fri May 19 17:49:06 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Fri May 19 17:49:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26374 >/dev/null 2>/dev/null
selfserv with PID 26374 found at Fri May 19 17:49:06 UTC 2017
selfserv with PID 26374 started at Fri May 19 17:49:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2399: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26374 at Fri May 19 17:49:07 UTC 2017
kill -USR1 26374
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26374 killed at Fri May 19 17:49:07 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Fri May 19 17:49:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26437 >/dev/null 2>/dev/null
selfserv with PID 26437 found at Fri May 19 17:49:08 UTC 2017
selfserv with PID 26437 started at Fri May 19 17:49:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -w nss -n TestUser -a testbuildd-sni.(none) -a testbuildd.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
ssl.sh: #2400: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26437 at Fri May 19 17:49:08 UTC 2017
kill -USR1 26437
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26437 killed at Fri May 19 17:49:09 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Fri May 19 17:49:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26501 >/dev/null 2>/dev/null
selfserv with PID 26501 found at Fri May 19 17:49:09 UTC 2017
selfserv with PID 26501 started at Fri May 19 17:49:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni.(none) -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #2401: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26501 at Fri May 19 17:49:10 UTC 2017
kill -USR1 26501
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26501 killed at Fri May 19 17:49:10 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Fri May 19 17:49:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26564 >/dev/null 2>/dev/null
selfserv with PID 26564 found at Fri May 19 17:49:10 UTC 2017
selfserv with PID 26564 started at Fri May 19 17:49:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2402: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26564 at Fri May 19 17:49:11 UTC 2017
kill -USR1 26564
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26564 killed at Fri May 19 17:49:11 UTC 2017
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test  - server normal/client bypass  - with ECC ===============================
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Fri May 19 17:49:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26674 >/dev/null 2>/dev/null
selfserv with PID 26674 found at Fri May 19 17:49:11 UTC 2017
selfserv with PID 26674 started at Fri May 19 17:49:11 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 1000 -C c -V ssl3:ssl3 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:49:11 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:49:13 UTC 2017
ssl.sh: #2403: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26674 at Fri May 19 17:49:13 UTC 2017
kill -USR1 26674
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26674 killed at Fri May 19 17:49:13 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Fri May 19 17:49:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26748 >/dev/null 2>/dev/null
selfserv with PID 26748 found at Fri May 19 17:49:13 UTC 2017
selfserv with PID 26748 started at Fri May 19 17:49:13 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 1000 -C c \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:49:13 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:49:15 UTC 2017
ssl.sh: #2404: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26748 at Fri May 19 17:49:15 UTC 2017
kill -USR1 26748
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26748 killed at Fri May 19 17:49:15 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Fri May 19 17:49:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26822 >/dev/null 2>/dev/null
selfserv with PID 26822 found at Fri May 19 17:49:16 UTC 2017
selfserv with PID 26822 started at Fri May 19 17:49:16 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 1000 -C c -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:49:16 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:49:17 UTC 2017
ssl.sh: #2405: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26822 at Fri May 19 17:49:17 UTC 2017
kill -USR1 26822
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26822 killed at Fri May 19 17:49:18 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Fri May 19 17:49:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26896 >/dev/null 2>/dev/null
selfserv with PID 26896 found at Fri May 19 17:49:18 UTC 2017
selfserv with PID 26896 started at Fri May 19 17:49:18 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:49:18 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:49:20 UTC 2017
ssl.sh: #2406: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26896 at Fri May 19 17:49:20 UTC 2017
kill -USR1 26896
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26896 killed at Fri May 19 17:49:20 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Fri May 19 17:49:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26970 >/dev/null 2>/dev/null
selfserv with PID 26970 found at Fri May 19 17:49:20 UTC 2017
selfserv with PID 26970 started at Fri May 19 17:49:20 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:49:20 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:49:22 UTC 2017
ssl.sh: #2407: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26970 at Fri May 19 17:49:22 UTC 2017
kill -USR1 26970
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26970 killed at Fri May 19 17:49:23 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Fri May 19 17:49:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27044 >/dev/null 2>/dev/null
selfserv with PID 27044 found at Fri May 19 17:49:23 UTC 2017
selfserv with PID 27044 started at Fri May 19 17:49:23 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:49:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:49:25 UTC 2017
ssl.sh: #2408: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27044 at Fri May 19 17:49:25 UTC 2017
kill -USR1 27044
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27044 killed at Fri May 19 17:49:25 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Fri May 19 17:49:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27118 >/dev/null 2>/dev/null
selfserv with PID 27118 found at Fri May 19 17:49:26 UTC 2017
selfserv with PID 27118 started at Fri May 19 17:49:26 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:49:26 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:49:28 UTC 2017
ssl.sh: #2409: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27118 at Fri May 19 17:49:28 UTC 2017
kill -USR1 27118
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27118 killed at Fri May 19 17:49:28 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Fri May 19 17:49:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27198 >/dev/null 2>/dev/null
selfserv with PID 27198 found at Fri May 19 17:49:28 UTC 2017
selfserv with PID 27198 started at Fri May 19 17:49:28 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:49:28 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:49:30 UTC 2017
ssl.sh: #2410: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27198 at Fri May 19 17:49:30 UTC 2017
kill -USR1 27198
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27198 killed at Fri May 19 17:49:30 UTC 2017
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Fri May 19 17:49:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27287 >/dev/null 2>/dev/null
selfserv with PID 27287 found at Fri May 19 17:49:31 UTC 2017
selfserv with PID 27287 started at Fri May 19 17:49:31 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:49:31 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:49:35 UTC 2017
ssl.sh: #2411: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27287 at Fri May 19 17:49:35 UTC 2017
kill -USR1 27287
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27287 killed at Fri May 19 17:49:35 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Fri May 19 17:49:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27360 >/dev/null 2>/dev/null
selfserv with PID 27360 found at Fri May 19 17:49:36 UTC 2017
selfserv with PID 27360 started at Fri May 19 17:49:36 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:49:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:49:40 UTC 2017
ssl.sh: #2412: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27360 at Fri May 19 17:49:40 UTC 2017
kill -USR1 27360
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27360 killed at Fri May 19 17:49:40 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Fri May 19 17:49:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27433 >/dev/null 2>/dev/null
selfserv with PID 27433 found at Fri May 19 17:49:40 UTC 2017
selfserv with PID 27433 started at Fri May 19 17:49:40 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:49:40 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 17:49:41 UTC 2017
ssl.sh: #2413: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27433 at Fri May 19 17:49:42 UTC 2017
kill -USR1 27433
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27433 killed at Fri May 19 17:49:42 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Fri May 19 17:49:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27507 >/dev/null 2>/dev/null
selfserv with PID 27507 found at Fri May 19 17:49:42 UTC 2017
selfserv with PID 27507 started at Fri May 19 17:49:42 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:49:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:49:43 UTC 2017
ssl.sh: #2414: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27507 at Fri May 19 17:49:43 UTC 2017
kill -USR1 27507
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27507 killed at Fri May 19 17:49:43 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Fri May 19 17:49:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27581 >/dev/null 2>/dev/null
selfserv with PID 27581 found at Fri May 19 17:49:43 UTC 2017
selfserv with PID 27581 started at Fri May 19 17:49:43 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:49:43 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:49:44 UTC 2017
ssl.sh: #2415: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27581 at Fri May 19 17:49:44 UTC 2017
kill -USR1 27581
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27581 killed at Fri May 19 17:49:44 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Fri May 19 17:49:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27655 >/dev/null 2>/dev/null
selfserv with PID 27655 found at Fri May 19 17:49:45 UTC 2017
selfserv with PID 27655 started at Fri May 19 17:49:45 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:49:45 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 17:49:46 UTC 2017
ssl.sh: #2416: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27655 at Fri May 19 17:49:46 UTC 2017
kill -USR1 27655
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27655 killed at Fri May 19 17:49:46 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Fri May 19 17:49:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27729 >/dev/null 2>/dev/null
selfserv with PID 27729 found at Fri May 19 17:49:46 UTC 2017
selfserv with PID 27729 started at Fri May 19 17:49:46 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:49:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 17:49:47 UTC 2017
ssl.sh: #2417: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27729 at Fri May 19 17:49:47 UTC 2017
kill -USR1 27729
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27729 killed at Fri May 19 17:49:47 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Fri May 19 17:49:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27809 >/dev/null 2>/dev/null
selfserv with PID 27809 found at Fri May 19 17:49:47 UTC 2017
selfserv with PID 27809 started at Fri May 19 17:49:47 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:49:47 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:49:50 UTC 2017
ssl.sh: #2418: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27809 at Fri May 19 17:49:50 UTC 2017
kill -USR1 27809
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27809 killed at Fri May 19 17:49:50 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Fri May 19 17:49:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a testbuildd-sni.(none) -k testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27889 >/dev/null 2>/dev/null
selfserv with PID 27889 found at Fri May 19 17:49:50 UTC 2017
selfserv with PID 27889 started at Fri May 19 17:49:50 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V tls1.0:tls1.2 -c 1000 -C c -u -a testbuildd-sni.(none) \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:49:50 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:49:52 UTC 2017
ssl.sh: #2419: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27889 at Fri May 19 17:49:52 UTC 2017
kill -USR1 27889
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27889 killed at Fri May 19 17:49:53 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Fri May 19 17:49:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:49:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27978 >/dev/null 2>/dev/null
selfserv with PID 27978 found at Fri May 19 17:49:53 UTC 2017
selfserv with PID 27978 started at Fri May 19 17:49:53 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:49:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:50:00 UTC 2017
ssl.sh: #2420: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27978 at Fri May 19 17:50:00 UTC 2017
kill -USR1 27978
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27978 killed at Fri May 19 17:50:00 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ----
selfserv starting at Fri May 19 17:50:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C023 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:50:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28051 >/dev/null 2>/dev/null
selfserv with PID 28051 found at Fri May 19 17:50:01 UTC 2017
selfserv with PID 28051 started at Fri May 19 17:50:01 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:50:01 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:50:09 UTC 2017
ssl.sh: #2421: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28051 at Fri May 19 17:50:09 UTC 2017
kill -USR1 28051
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28051 killed at Fri May 19 17:50:09 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) ----
selfserv starting at Fri May 19 17:50:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02B -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:50:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28166 >/dev/null 2>/dev/null
selfserv with PID 28166 found at Fri May 19 17:50:10 UTC 2017
selfserv with PID 28166 started at Fri May 19 17:50:10 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:50:10 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:50:18 UTC 2017
ssl.sh: #2422: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28166 at Fri May 19 17:50:18 UTC 2017
kill -USR1 28166
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28166 killed at Fri May 19 17:50:18 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Fri May 19 17:50:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:50:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28241 >/dev/null 2>/dev/null
selfserv with PID 28241 found at Fri May 19 17:50:18 UTC 2017
selfserv with PID 28241 started at Fri May 19 17:50:18 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:50:18 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:50:28 UTC 2017
ssl.sh: #2423: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28241 at Fri May 19 17:50:28 UTC 2017
kill -USR1 28241
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28241 killed at Fri May 19 17:50:28 UTC 2017
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Fri May 19 17:50:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C00E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:50:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28314 >/dev/null 2>/dev/null
selfserv with PID 28314 found at Fri May 19 17:50:28 UTC 2017
selfserv with PID 28314 started at Fri May 19 17:50:28 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:50:28 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:50:35 UTC 2017
ssl.sh: #2424: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28314 at Fri May 19 17:50:35 UTC 2017
kill -USR1 28314
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28314 killed at Fri May 19 17:50:35 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Fri May 19 17:50:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:50:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28387 >/dev/null 2>/dev/null
selfserv with PID 28387 found at Fri May 19 17:50:35 UTC 2017
selfserv with PID 28387 started at Fri May 19 17:50:35 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:50:35 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:50:37 UTC 2017
ssl.sh: #2425: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28387 at Fri May 19 17:50:37 UTC 2017
kill -USR1 28387
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28387 killed at Fri May 19 17:50:37 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 ----
selfserv starting at Fri May 19 17:50:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C027 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:50:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28461 >/dev/null 2>/dev/null
selfserv with PID 28461 found at Fri May 19 17:50:37 UTC 2017
selfserv with PID 28461 started at Fri May 19 17:50:37 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:50:38 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:50:40 UTC 2017
ssl.sh: #2426: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28461 at Fri May 19 17:50:40 UTC 2017
kill -USR1 28461
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28461 killed at Fri May 19 17:50:40 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 GCM ----
selfserv starting at Fri May 19 17:50:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02F -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:50:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28535 >/dev/null 2>/dev/null
selfserv with PID 28535 found at Fri May 19 17:50:40 UTC 2017
selfserv with PID 28535 started at Fri May 19 17:50:40 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:50:40 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:50:42 UTC 2017
ssl.sh: #2427: Stress TLS  ECDHE-RSA   AES 128 GCM produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28535 at Fri May 19 17:50:42 UTC 2017
kill -USR1 28535
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28535 killed at Fri May 19 17:50:42 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Fri May 19 17:50:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:50:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28609 >/dev/null 2>/dev/null
selfserv with PID 28609 found at Fri May 19 17:50:42 UTC 2017
selfserv with PID 28609 started at Fri May 19 17:50:42 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:50:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:50:45 UTC 2017
ssl.sh: #2428: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28609 at Fri May 19 17:50:45 UTC 2017
kill -USR1 28609
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28609 killed at Fri May 19 17:50:45 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Fri May 19 17:50:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:50:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28683 >/dev/null 2>/dev/null
selfserv with PID 28683 found at Fri May 19 17:50:45 UTC 2017
selfserv with PID 28683 started at Fri May 19 17:50:45 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:50:45 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 17:50:46 UTC 2017
ssl.sh: #2429: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28683 at Fri May 19 17:50:46 UTC 2017
kill -USR1 28683
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28683 killed at Fri May 19 17:50:46 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 17:50:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:50:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28772 >/dev/null 2>/dev/null
selfserv with PID 28772 found at Fri May 19 17:50:46 UTC 2017
selfserv with PID 28772 started at Fri May 19 17:50:46 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:50:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 17:50:49 UTC 2017
ssl.sh: #2430: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28772 at Fri May 19 17:50:49 UTC 2017
kill -USR1 28772
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28772 killed at Fri May 19 17:50:49 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Fri May 19 17:50:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:50:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28845 >/dev/null 2>/dev/null
selfserv with PID 28845 found at Fri May 19 17:50:49 UTC 2017
selfserv with PID 28845 started at Fri May 19 17:50:49 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:50:49 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:50:50 UTC 2017
ssl.sh: #2431: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28845 at Fri May 19 17:50:50 UTC 2017
kill -USR1 28845
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28845 killed at Fri May 19 17:50:50 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 17:50:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:50:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28919 >/dev/null 2>/dev/null
selfserv with PID 28919 found at Fri May 19 17:50:51 UTC 2017
selfserv with PID 28919 started at Fri May 19 17:50:51 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:50:51 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 17:50:53 UTC 2017
ssl.sh: #2432: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28919 at Fri May 19 17:50:53 UTC 2017
kill -USR1 28919
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28919 killed at Fri May 19 17:50:53 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 17:50:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:50:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28992 >/dev/null 2>/dev/null
selfserv with PID 28992 found at Fri May 19 17:50:53 UTC 2017
selfserv with PID 28992 started at Fri May 19 17:50:53 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n TestUser-ecmixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:50:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 17:50:55 UTC 2017
ssl.sh: #2433: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28992 at Fri May 19 17:50:55 UTC 2017
kill -USR1 28992
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28992 killed at Fri May 19 17:50:55 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Fri May 19 17:50:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:50:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29065 >/dev/null 2>/dev/null
selfserv with PID 29065 found at Fri May 19 17:50:55 UTC 2017
selfserv with PID 29065 started at Fri May 19 17:50:55 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:50:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:50:57 UTC 2017
ssl.sh: #2434: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29065 at Fri May 19 17:50:57 UTC 2017
kill -USR1 29065
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29065 killed at Fri May 19 17:50:57 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Fri May 19 17:50:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:50:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29139 >/dev/null 2>/dev/null
selfserv with PID 29139 found at Fri May 19 17:50:57 UTC 2017
selfserv with PID 29139 started at Fri May 19 17:50:57 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:50:57 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 17:50:58 UTC 2017
ssl.sh: #2435: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29139 at Fri May 19 17:50:58 UTC 2017
kill -USR1 29139
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29139 killed at Fri May 19 17:50:58 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ----
selfserv starting at Fri May 19 17:50:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0016 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:50:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29228 >/dev/null 2>/dev/null
selfserv with PID 29228 found at Fri May 19 17:50:59 UTC 2017
selfserv with PID 29228 started at Fri May 19 17:50:59 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:50:59 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:51:04 UTC 2017
ssl.sh: #2436: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29228 at Fri May 19 17:51:04 UTC 2017
kill -USR1 29228
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29228 killed at Fri May 19 17:51:04 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ----
selfserv starting at Fri May 19 17:51:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0033 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:51:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29302 >/dev/null 2>/dev/null
selfserv with PID 29302 found at Fri May 19 17:51:04 UTC 2017
selfserv with PID 29302 started at Fri May 19 17:51:04 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:51:04 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:51:07 UTC 2017
ssl.sh: #2437: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29302 at Fri May 19 17:51:07 UTC 2017
kill -USR1 29302
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29302 killed at Fri May 19 17:51:07 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Fri May 19 17:51:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0039 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:51:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29376 >/dev/null 2>/dev/null
selfserv with PID 29376 found at Fri May 19 17:51:07 UTC 2017
selfserv with PID 29376 started at Fri May 19 17:51:07 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:51:07 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:51:13 UTC 2017
ssl.sh: #2438: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29376 at Fri May 19 17:51:13 UTC 2017
kill -USR1 29376
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29376 killed at Fri May 19 17:51:13 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ----
selfserv starting at Fri May 19 17:51:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0040 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:51:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29450 >/dev/null 2>/dev/null
selfserv with PID 29450 found at Fri May 19 17:51:13 UTC 2017
selfserv with PID 29450 started at Fri May 19 17:51:13 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:51:13 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:51:20 UTC 2017
ssl.sh: #2439: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29450 at Fri May 19 17:51:20 UTC 2017
kill -USR1 29450
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29450 killed at Fri May 19 17:51:20 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Fri May 19 17:51:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0038 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:51:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29533 >/dev/null 2>/dev/null
selfserv with PID 29533 found at Fri May 19 17:51:20 UTC 2017
selfserv with PID 29533 started at Fri May 19 17:51:20 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:51:20 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 17:52:23 UTC 2017
ssl.sh: #2440: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29533 at Fri May 19 17:52:23 UTC 2017
kill -USR1 29533
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29533 killed at Fri May 19 17:52:23 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ----
selfserv starting at Fri May 19 17:52:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006A -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:52:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29617 >/dev/null 2>/dev/null
selfserv with PID 29617 found at Fri May 19 17:52:23 UTC 2017
selfserv with PID 29617 started at Fri May 19 17:52:23 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:52:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 17:53:26 UTC 2017
ssl.sh: #2441: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29617 at Fri May 19 17:53:26 UTC 2017
kill -USR1 29617
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29617 killed at Fri May 19 17:53:26 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ----
selfserv starting at Fri May 19 17:53:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006B -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:53:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29706 >/dev/null 2>/dev/null
selfserv with PID 29706 found at Fri May 19 17:53:26 UTC 2017
selfserv with PID 29706 started at Fri May 19 17:53:26 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:53:26 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:53:32 UTC 2017
ssl.sh: #2442: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29706 at Fri May 19 17:53:32 UTC 2017
kill -USR1 29706
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29706 killed at Fri May 19 17:53:32 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ----
selfserv starting at Fri May 19 17:53:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:53:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29781 >/dev/null 2>/dev/null
selfserv with PID 29781 found at Fri May 19 17:53:32 UTC 2017
selfserv with PID 29781 started at Fri May 19 17:53:32 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:53:32 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:53:38 UTC 2017
ssl.sh: #2443: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29781 at Fri May 19 17:53:38 UTC 2017
kill -USR1 29781
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29781 killed at Fri May 19 17:53:38 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ----
selfserv starting at Fri May 19 17:53:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009F -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:53:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29854 >/dev/null 2>/dev/null
selfserv with PID 29854 found at Fri May 19 17:53:38 UTC 2017
selfserv with PID 29854 started at Fri May 19 17:53:38 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:53:38 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:53:44 UTC 2017
ssl.sh: #2444: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29854 at Fri May 19 17:53:44 UTC 2017
kill -USR1 29854
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29854 killed at Fri May 19 17:53:44 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 17:53:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:53:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29942 >/dev/null 2>/dev/null
selfserv with PID 29942 found at Fri May 19 17:53:44 UTC 2017
selfserv with PID 29942 started at Fri May 19 17:53:44 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:53:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:53:54 UTC 2017
ssl.sh: #2445: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29942 at Fri May 19 17:53:54 UTC 2017
kill -USR1 29942
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29942 killed at Fri May 19 17:53:54 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Fri May 19 17:53:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:53:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30029 >/dev/null 2>/dev/null
selfserv with PID 30029 found at Fri May 19 17:53:54 UTC 2017
selfserv with PID 30029 started at Fri May 19 17:53:55 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n TestUser-dsamixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:53:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:53:57 UTC 2017
ssl.sh: #2446: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30029 at Fri May 19 17:53:57 UTC 2017
kill -USR1 30029
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30029 killed at Fri May 19 17:53:57 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Fri May 19 17:53:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:53:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30144 >/dev/null 2>/dev/null
selfserv with PID 30144 found at Fri May 19 17:53:58 UTC 2017
selfserv with PID 30144 started at Fri May 19 17:53:58 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:53:58 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 17:55:33 UTC 2017
ssl.sh: #2447: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30144 at Fri May 19 17:55:33 UTC 2017
kill -USR1 30144
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30144 killed at Fri May 19 17:55:33 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Fri May 19 17:55:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:55:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30525 >/dev/null 2>/dev/null
selfserv with PID 30525 found at Fri May 19 17:55:33 UTC 2017
selfserv with PID 30525 started at Fri May 19 17:55:33 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:55:33 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 17:57:06 UTC 2017
ssl.sh: #2448: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30525 at Fri May 19 17:57:06 UTC 2017
kill -USR1 30525
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30525 killed at Fri May 19 17:57:07 UTC 2017
ssl.sh: SSL Cipher Coverage Extended Test - server normal/client bypass  - with ECC ===============================
selfserv starting at Fri May 19 17:57:07 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:57:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:07 UTC 2017
selfserv with PID 30588 started at Fri May 19 17:57:07 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2449: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2450: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2451: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2452: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2453: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2454: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2455: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2456: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2457: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2458: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2459: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2460: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2461: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2462: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2463: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2464: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2465: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2466: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2467: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2468: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2469: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2470: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2471: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2472: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2473: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2474: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2475: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2476: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2477: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2478: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2479: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2480: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2481: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2482: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2483: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2484: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2485: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2486: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2487: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2488: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2489: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2490: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2491: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2492: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2493: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2494: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2495: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2496: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2497: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2498: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2499: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2500: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2501: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2502: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2503: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2504: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2505: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2506: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2507: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2508: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2509: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2510: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2511: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2512: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2513: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2514: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2515: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2516: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2517: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2518: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2519: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2520: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2521: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2522: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2523: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2524: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2525: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2526: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30588 >/dev/null 2>/dev/null
selfserv with PID 30588 found at Fri May 19 17:57:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2527: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30588 at Fri May 19 17:57:32 UTC 2017
kill -USR1 30588
selfserv: 0 cache hits; 79 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30588 killed at Fri May 19 17:57:32 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:57:32 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:57:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32426 >/dev/null 2>/dev/null
selfserv with PID 32426 found at Fri May 19 17:57:32 UTC 2017
selfserv with PID 32426 started at Fri May 19 17:57:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2528: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32426 >/dev/null 2>/dev/null
selfserv with PID 32426 found at Fri May 19 17:57:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2529: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32426 >/dev/null 2>/dev/null
selfserv with PID 32426 found at Fri May 19 17:57:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2530: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32426 >/dev/null 2>/dev/null
selfserv with PID 32426 found at Fri May 19 17:57:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2531: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32426 >/dev/null 2>/dev/null
selfserv with PID 32426 found at Fri May 19 17:57:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2532: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32426 at Fri May 19 17:57:34 UTC 2017
kill -USR1 32426
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32426 killed at Fri May 19 17:57:34 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:57:34 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:57:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32564 >/dev/null 2>/dev/null
selfserv with PID 32564 found at Fri May 19 17:57:34 UTC 2017
selfserv with PID 32564 started at Fri May 19 17:57:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2533: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32564 >/dev/null 2>/dev/null
selfserv with PID 32564 found at Fri May 19 17:57:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2534: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32564 >/dev/null 2>/dev/null
selfserv with PID 32564 found at Fri May 19 17:57:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2535: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32564 >/dev/null 2>/dev/null
selfserv with PID 32564 found at Fri May 19 17:57:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2536: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32564 >/dev/null 2>/dev/null
selfserv with PID 32564 found at Fri May 19 17:57:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2537: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 32564 >/dev/null 2>/dev/null
selfserv with PID 32564 found at Fri May 19 17:57:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2538: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 32564 >/dev/null 2>/dev/null
selfserv with PID 32564 found at Fri May 19 17:57:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2539: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32564 >/dev/null 2>/dev/null
selfserv with PID 32564 found at Fri May 19 17:57:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2540: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32564 >/dev/null 2>/dev/null
selfserv with PID 32564 found at Fri May 19 17:57:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2541: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32564 >/dev/null 2>/dev/null
selfserv with PID 32564 found at Fri May 19 17:57:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2542: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 32564 >/dev/null 2>/dev/null
selfserv with PID 32564 found at Fri May 19 17:57:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2543: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 32564 >/dev/null 2>/dev/null
selfserv with PID 32564 found at Fri May 19 17:57:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2544: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32564 >/dev/null 2>/dev/null
selfserv with PID 32564 found at Fri May 19 17:57:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2545: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32564 >/dev/null 2>/dev/null
selfserv with PID 32564 found at Fri May 19 17:57:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2546: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32564 >/dev/null 2>/dev/null
selfserv with PID 32564 found at Fri May 19 17:57:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2547: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32564 at Fri May 19 17:57:41 UTC 2017
kill -USR1 32564
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32564 killed at Fri May 19 17:57:41 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:57:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:57:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 453 >/dev/null 2>/dev/null
selfserv with PID 453 found at Fri May 19 17:57:41 UTC 2017
selfserv with PID 453 started at Fri May 19 17:57:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2548: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 453 >/dev/null 2>/dev/null
selfserv with PID 453 found at Fri May 19 17:57:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2549: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 453 >/dev/null 2>/dev/null
selfserv with PID 453 found at Fri May 19 17:57:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2550: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 453 >/dev/null 2>/dev/null
selfserv with PID 453 found at Fri May 19 17:57:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2551: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 453 >/dev/null 2>/dev/null
selfserv with PID 453 found at Fri May 19 17:57:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2552: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 453 at Fri May 19 17:57:43 UTC 2017
kill -USR1 453
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 453 killed at Fri May 19 17:57:43 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:57:43 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:57:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 599 >/dev/null 2>/dev/null
selfserv with PID 599 found at Fri May 19 17:57:43 UTC 2017
selfserv with PID 599 started at Fri May 19 17:57:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2553: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 599 >/dev/null 2>/dev/null
selfserv with PID 599 found at Fri May 19 17:57:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2554: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 599 >/dev/null 2>/dev/null
selfserv with PID 599 found at Fri May 19 17:57:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2555: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 599 >/dev/null 2>/dev/null
selfserv with PID 599 found at Fri May 19 17:57:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2556: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 599 >/dev/null 2>/dev/null
selfserv with PID 599 found at Fri May 19 17:57:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2557: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 599 >/dev/null 2>/dev/null
selfserv with PID 599 found at Fri May 19 17:57:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2558: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 599 >/dev/null 2>/dev/null
selfserv with PID 599 found at Fri May 19 17:57:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2559: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 599 >/dev/null 2>/dev/null
selfserv with PID 599 found at Fri May 19 17:57:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2560: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 599 >/dev/null 2>/dev/null
selfserv with PID 599 found at Fri May 19 17:57:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2561: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 599 >/dev/null 2>/dev/null
selfserv with PID 599 found at Fri May 19 17:57:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2562: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 599 >/dev/null 2>/dev/null
selfserv with PID 599 found at Fri May 19 17:57:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2563: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 599 >/dev/null 2>/dev/null
selfserv with PID 599 found at Fri May 19 17:57:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2564: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 599 >/dev/null 2>/dev/null
selfserv with PID 599 found at Fri May 19 17:57:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2565: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 599 >/dev/null 2>/dev/null
selfserv with PID 599 found at Fri May 19 17:57:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2566: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 599 >/dev/null 2>/dev/null
selfserv with PID 599 found at Fri May 19 17:57:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2567: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 599 at Fri May 19 17:57:50 UTC 2017
kill -USR1 599
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 599 killed at Fri May 19 17:57:50 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:57:50 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:57:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 957 >/dev/null 2>/dev/null
selfserv with PID 957 found at Fri May 19 17:57:50 UTC 2017
selfserv with PID 957 started at Fri May 19 17:57:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2568: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 957 >/dev/null 2>/dev/null
selfserv with PID 957 found at Fri May 19 17:57:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2569: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 957 >/dev/null 2>/dev/null
selfserv with PID 957 found at Fri May 19 17:57:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2570: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 957 >/dev/null 2>/dev/null
selfserv with PID 957 found at Fri May 19 17:57:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2571: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 957 >/dev/null 2>/dev/null
selfserv with PID 957 found at Fri May 19 17:57:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2572: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 957 at Fri May 19 17:57:51 UTC 2017
kill -USR1 957
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 957 killed at Fri May 19 17:57:52 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 17:57:52 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:57:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1095 >/dev/null 2>/dev/null
selfserv with PID 1095 found at Fri May 19 17:57:52 UTC 2017
selfserv with PID 1095 started at Fri May 19 17:57:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2573: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 1095 >/dev/null 2>/dev/null
selfserv with PID 1095 found at Fri May 19 17:57:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2574: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1095 >/dev/null 2>/dev/null
selfserv with PID 1095 found at Fri May 19 17:57:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2575: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1095 >/dev/null 2>/dev/null
selfserv with PID 1095 found at Fri May 19 17:57:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2576: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1095 >/dev/null 2>/dev/null
selfserv with PID 1095 found at Fri May 19 17:57:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2577: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 1095 >/dev/null 2>/dev/null
selfserv with PID 1095 found at Fri May 19 17:57:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2578: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 1095 >/dev/null 2>/dev/null
selfserv with PID 1095 found at Fri May 19 17:57:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2579: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 1095 >/dev/null 2>/dev/null
selfserv with PID 1095 found at Fri May 19 17:57:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2580: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 1095 >/dev/null 2>/dev/null
selfserv with PID 1095 found at Fri May 19 17:57:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2581: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 1095 >/dev/null 2>/dev/null
selfserv with PID 1095 found at Fri May 19 17:57:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2582: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 1095 >/dev/null 2>/dev/null
selfserv with PID 1095 found at Fri May 19 17:57:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2583: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 1095 >/dev/null 2>/dev/null
selfserv with PID 1095 found at Fri May 19 17:57:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2584: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 1095 >/dev/null 2>/dev/null
selfserv with PID 1095 found at Fri May 19 17:57:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2585: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 1095 >/dev/null 2>/dev/null
selfserv with PID 1095 found at Fri May 19 17:57:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2586: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 1095 >/dev/null 2>/dev/null
selfserv with PID 1095 found at Fri May 19 17:57:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2 -B -s \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2587: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1095 at Fri May 19 17:57:57 UTC 2017
kill -USR1 1095
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1095 killed at Fri May 19 17:57:57 UTC 2017
ssl.sh: SSL Client Authentication Extended Test - server normal/client bypass  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:57:58 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:57:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1498 >/dev/null 2>/dev/null
selfserv with PID 1498 found at Fri May 19 17:57:58 UTC 2017
selfserv with PID 1498 started at Fri May 19 17:57:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2588: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1498 at Fri May 19 17:57:59 UTC 2017
kill -USR1 1498
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1498 killed at Fri May 19 17:57:59 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Fri May 19 17:57:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:57:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1555 >/dev/null 2>/dev/null
selfserv with PID 1555 found at Fri May 19 17:57:59 UTC 2017
selfserv with PID 1555 started at Fri May 19 17:57:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2589: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1555 at Fri May 19 17:58:00 UTC 2017
kill -USR1 1555
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1555 killed at Fri May 19 17:58:00 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Fri May 19 17:58:00 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1612 >/dev/null 2>/dev/null
selfserv with PID 1612 found at Fri May 19 17:58:01 UTC 2017
selfserv with PID 1612 started at Fri May 19 17:58:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2590: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1612 at Fri May 19 17:58:02 UTC 2017
kill -USR1 1612
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1612 killed at Fri May 19 17:58:02 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:58:02 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1669 >/dev/null 2>/dev/null
selfserv with PID 1669 found at Fri May 19 17:58:02 UTC 2017
selfserv with PID 1669 started at Fri May 19 17:58:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2591: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1669 at Fri May 19 17:58:03 UTC 2017
kill -USR1 1669
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1669 killed at Fri May 19 17:58:03 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Fri May 19 17:58:03 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1726 >/dev/null 2>/dev/null
selfserv with PID 1726 found at Fri May 19 17:58:03 UTC 2017
selfserv with PID 1726 started at Fri May 19 17:58:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2592: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1726 at Fri May 19 17:58:04 UTC 2017
kill -USR1 1726
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1726 killed at Fri May 19 17:58:04 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Fri May 19 17:58:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1783 >/dev/null 2>/dev/null
selfserv with PID 1783 found at Fri May 19 17:58:05 UTC 2017
selfserv with PID 1783 started at Fri May 19 17:58:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2593: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1783 at Fri May 19 17:58:06 UTC 2017
kill -USR1 1783
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1783 killed at Fri May 19 17:58:06 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:58:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1840 >/dev/null 2>/dev/null
selfserv with PID 1840 found at Fri May 19 17:58:06 UTC 2017
selfserv with PID 1840 started at Fri May 19 17:58:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2594: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1840 at Fri May 19 17:58:07 UTC 2017
kill -USR1 1840
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1840 killed at Fri May 19 17:58:07 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Fri May 19 17:58:07 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1898 >/dev/null 2>/dev/null
selfserv with PID 1898 found at Fri May 19 17:58:07 UTC 2017
selfserv with PID 1898 started at Fri May 19 17:58:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2595: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1898 at Fri May 19 17:58:08 UTC 2017
kill -USR1 1898
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1898 killed at Fri May 19 17:58:08 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Fri May 19 17:58:08 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1955 >/dev/null 2>/dev/null
selfserv with PID 1955 found at Fri May 19 17:58:08 UTC 2017
selfserv with PID 1955 started at Fri May 19 17:58:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2596: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1955 at Fri May 19 17:58:10 UTC 2017
kill -USR1 1955
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1955 killed at Fri May 19 17:58:10 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 17:58:10 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2012 >/dev/null 2>/dev/null
selfserv with PID 2012 found at Fri May 19 17:58:10 UTC 2017
selfserv with PID 2012 started at Fri May 19 17:58:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2597: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2012 at Fri May 19 17:58:11 UTC 2017
kill -USR1 2012
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2012 killed at Fri May 19 17:58:11 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Fri May 19 17:58:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2090 >/dev/null 2>/dev/null
selfserv with PID 2090 found at Fri May 19 17:58:11 UTC 2017
selfserv with PID 2090 started at Fri May 19 17:58:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2598: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2090 at Fri May 19 17:58:12 UTC 2017
kill -USR1 2090
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2090 killed at Fri May 19 17:58:12 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Fri May 19 17:58:12 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2147 >/dev/null 2>/dev/null
selfserv with PID 2147 found at Fri May 19 17:58:12 UTC 2017
selfserv with PID 2147 started at Fri May 19 17:58:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2599: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2147 at Fri May 19 17:58:13 UTC 2017
kill -USR1 2147
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2147 killed at Fri May 19 17:58:13 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:58:13 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2204 >/dev/null 2>/dev/null
selfserv with PID 2204 found at Fri May 19 17:58:13 UTC 2017
selfserv with PID 2204 started at Fri May 19 17:58:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2600: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2204 at Fri May 19 17:58:15 UTC 2017
kill -USR1 2204
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2204 killed at Fri May 19 17:58:15 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:58:15 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2261 >/dev/null 2>/dev/null
selfserv with PID 2261 found at Fri May 19 17:58:15 UTC 2017
selfserv with PID 2261 started at Fri May 19 17:58:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2601: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2261 at Fri May 19 17:58:16 UTC 2017
kill -USR1 2261
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2261 killed at Fri May 19 17:58:16 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:58:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2318 >/dev/null 2>/dev/null
selfserv with PID 2318 found at Fri May 19 17:58:16 UTC 2017
selfserv with PID 2318 started at Fri May 19 17:58:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2602: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2318 at Fri May 19 17:58:18 UTC 2017
kill -USR1 2318
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2318 killed at Fri May 19 17:58:18 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:58:18 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2375 >/dev/null 2>/dev/null
selfserv with PID 2375 found at Fri May 19 17:58:18 UTC 2017
selfserv with PID 2375 started at Fri May 19 17:58:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2603: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2375 at Fri May 19 17:58:19 UTC 2017
kill -USR1 2375
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2375 killed at Fri May 19 17:58:19 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:58:20 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2432 >/dev/null 2>/dev/null
selfserv with PID 2432 found at Fri May 19 17:58:20 UTC 2017
selfserv with PID 2432 started at Fri May 19 17:58:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2604: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2432 at Fri May 19 17:58:21 UTC 2017
kill -USR1 2432
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2432 killed at Fri May 19 17:58:21 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:58:21 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2489 >/dev/null 2>/dev/null
selfserv with PID 2489 found at Fri May 19 17:58:21 UTC 2017
selfserv with PID 2489 started at Fri May 19 17:58:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2605: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2489 at Fri May 19 17:58:23 UTC 2017
kill -USR1 2489
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2489 killed at Fri May 19 17:58:23 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:58:23 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2547 >/dev/null 2>/dev/null
selfserv with PID 2547 found at Fri May 19 17:58:23 UTC 2017
selfserv with PID 2547 started at Fri May 19 17:58:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2606: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2547 at Fri May 19 17:58:24 UTC 2017
kill -USR1 2547
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2547 killed at Fri May 19 17:58:24 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:58:24 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2609 >/dev/null 2>/dev/null
selfserv with PID 2609 found at Fri May 19 17:58:25 UTC 2017
selfserv with PID 2609 started at Fri May 19 17:58:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2607: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2609 at Fri May 19 17:58:26 UTC 2017
kill -USR1 2609
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2609 killed at Fri May 19 17:58:26 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:58:26 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2666 >/dev/null 2>/dev/null
selfserv with PID 2666 found at Fri May 19 17:58:26 UTC 2017
selfserv with PID 2666 started at Fri May 19 17:58:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2608: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2666 at Fri May 19 17:58:27 UTC 2017
kill -USR1 2666
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2666 killed at Fri May 19 17:58:28 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:58:28 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2724 >/dev/null 2>/dev/null
selfserv with PID 2724 found at Fri May 19 17:58:28 UTC 2017
selfserv with PID 2724 started at Fri May 19 17:58:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2609: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2724 at Fri May 19 17:58:29 UTC 2017
kill -USR1 2724
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2724 killed at Fri May 19 17:58:29 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:58:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2783 >/dev/null 2>/dev/null
selfserv with PID 2783 found at Fri May 19 17:58:29 UTC 2017
selfserv with PID 2783 started at Fri May 19 17:58:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2610: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2783 at Fri May 19 17:58:31 UTC 2017
kill -USR1 2783
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2783 killed at Fri May 19 17:58:31 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:58:31 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2841 >/dev/null 2>/dev/null
selfserv with PID 2841 found at Fri May 19 17:58:31 UTC 2017
selfserv with PID 2841 started at Fri May 19 17:58:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2611: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2841 at Fri May 19 17:58:32 UTC 2017
kill -USR1 2841
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2841 killed at Fri May 19 17:58:32 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:58:33 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2898 >/dev/null 2>/dev/null
selfserv with PID 2898 found at Fri May 19 17:58:33 UTC 2017
selfserv with PID 2898 started at Fri May 19 17:58:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2612: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2898 at Fri May 19 17:58:34 UTC 2017
kill -USR1 2898
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2898 killed at Fri May 19 17:58:34 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:58:34 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2955 >/dev/null 2>/dev/null
selfserv with PID 2955 found at Fri May 19 17:58:34 UTC 2017
selfserv with PID 2955 started at Fri May 19 17:58:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2613: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2955 at Fri May 19 17:58:35 UTC 2017
kill -USR1 2955
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2955 killed at Fri May 19 17:58:35 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:58:35 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3012 >/dev/null 2>/dev/null
selfserv with PID 3012 found at Fri May 19 17:58:35 UTC 2017
selfserv with PID 3012 started at Fri May 19 17:58:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2614: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3012 at Fri May 19 17:58:37 UTC 2017
kill -USR1 3012
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3012 killed at Fri May 19 17:58:37 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 17:58:37 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3070 >/dev/null 2>/dev/null
selfserv with PID 3070 found at Fri May 19 17:58:37 UTC 2017
selfserv with PID 3070 started at Fri May 19 17:58:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2615: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3070 at Fri May 19 17:58:38 UTC 2017
kill -USR1 3070
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3070 killed at Fri May 19 17:58:38 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 17:58:38 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3128 >/dev/null 2>/dev/null
selfserv with PID 3128 found at Fri May 19 17:58:38 UTC 2017
selfserv with PID 3128 started at Fri May 19 17:58:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2616: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3128 at Fri May 19 17:58:39 UTC 2017
kill -USR1 3128
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3128 killed at Fri May 19 17:58:39 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 17:58:39 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3187 >/dev/null 2>/dev/null
selfserv with PID 3187 found at Fri May 19 17:58:39 UTC 2017
selfserv with PID 3187 started at Fri May 19 17:58:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2617: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3187 at Fri May 19 17:58:41 UTC 2017
kill -USR1 3187
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3187 killed at Fri May 19 17:58:41 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:58:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3259 >/dev/null 2>/dev/null
selfserv with PID 3259 found at Fri May 19 17:58:41 UTC 2017
selfserv with PID 3259 started at Fri May 19 17:58:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2618: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3259 at Fri May 19 17:58:42 UTC 2017
kill -USR1 3259
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3259 killed at Fri May 19 17:58:42 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:58:42 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3316 >/dev/null 2>/dev/null
selfserv with PID 3316 found at Fri May 19 17:58:42 UTC 2017
selfserv with PID 3316 started at Fri May 19 17:58:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2619: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3316 at Fri May 19 17:58:44 UTC 2017
kill -USR1 3316
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3316 killed at Fri May 19 17:58:44 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:58:44 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3373 >/dev/null 2>/dev/null
selfserv with PID 3373 found at Fri May 19 17:58:44 UTC 2017
selfserv with PID 3373 started at Fri May 19 17:58:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2620: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3373 at Fri May 19 17:58:45 UTC 2017
kill -USR1 3373
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3373 killed at Fri May 19 17:58:45 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:58:45 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3430 >/dev/null 2>/dev/null
selfserv with PID 3430 found at Fri May 19 17:58:45 UTC 2017
selfserv with PID 3430 started at Fri May 19 17:58:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2621: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3430 at Fri May 19 17:58:46 UTC 2017
kill -USR1 3430
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3430 killed at Fri May 19 17:58:47 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:58:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3487 >/dev/null 2>/dev/null
selfserv with PID 3487 found at Fri May 19 17:58:47 UTC 2017
selfserv with PID 3487 started at Fri May 19 17:58:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2622: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3487 at Fri May 19 17:58:48 UTC 2017
kill -USR1 3487
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3487 killed at Fri May 19 17:58:48 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:58:48 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3544 >/dev/null 2>/dev/null
selfserv with PID 3544 found at Fri May 19 17:58:48 UTC 2017
selfserv with PID 3544 started at Fri May 19 17:58:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2623: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3544 at Fri May 19 17:58:49 UTC 2017
kill -USR1 3544
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3544 killed at Fri May 19 17:58:49 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 17:58:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3601 >/dev/null 2>/dev/null
selfserv with PID 3601 found at Fri May 19 17:58:49 UTC 2017
selfserv with PID 3601 started at Fri May 19 17:58:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2624: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3601 at Fri May 19 17:58:50 UTC 2017
kill -USR1 3601
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3601 killed at Fri May 19 17:58:50 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 17:58:50 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3658 >/dev/null 2>/dev/null
selfserv with PID 3658 found at Fri May 19 17:58:50 UTC 2017
selfserv with PID 3658 started at Fri May 19 17:58:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2625: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3658 at Fri May 19 17:58:52 UTC 2017
kill -USR1 3658
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3658 killed at Fri May 19 17:58:52 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:58:52 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3715 >/dev/null 2>/dev/null
selfserv with PID 3715 found at Fri May 19 17:58:52 UTC 2017
selfserv with PID 3715 started at Fri May 19 17:58:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2626: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3715 at Fri May 19 17:58:53 UTC 2017
kill -USR1 3715
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3715 killed at Fri May 19 17:58:53 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:58:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3772 >/dev/null 2>/dev/null
selfserv with PID 3772 found at Fri May 19 17:58:53 UTC 2017
selfserv with PID 3772 started at Fri May 19 17:58:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2627: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3772 at Fri May 19 17:58:55 UTC 2017
kill -USR1 3772
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3772 killed at Fri May 19 17:58:55 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:58:55 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3855 >/dev/null 2>/dev/null
selfserv with PID 3855 found at Fri May 19 17:58:55 UTC 2017
selfserv with PID 3855 started at Fri May 19 17:58:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2628: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3855 at Fri May 19 17:58:57 UTC 2017
kill -USR1 3855
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3855 killed at Fri May 19 17:58:57 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:58:57 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3939 >/dev/null 2>/dev/null
selfserv with PID 3939 found at Fri May 19 17:58:57 UTC 2017
selfserv with PID 3939 started at Fri May 19 17:58:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2629: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3939 at Fri May 19 17:58:59 UTC 2017
kill -USR1 3939
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3939 killed at Fri May 19 17:58:59 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:58:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:58:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4025 >/dev/null 2>/dev/null
selfserv with PID 4025 found at Fri May 19 17:58:59 UTC 2017
selfserv with PID 4025 started at Fri May 19 17:58:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2630: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4025 at Fri May 19 17:59:00 UTC 2017
kill -USR1 4025
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4025 killed at Fri May 19 17:59:00 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:59:00 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4150 >/dev/null 2>/dev/null
selfserv with PID 4150 found at Fri May 19 17:59:00 UTC 2017
selfserv with PID 4150 started at Fri May 19 17:59:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2631: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4150 at Fri May 19 17:59:02 UTC 2017
kill -USR1 4150
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4150 killed at Fri May 19 17:59:02 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:59:02 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4286 >/dev/null 2>/dev/null
selfserv with PID 4286 found at Fri May 19 17:59:02 UTC 2017
selfserv with PID 4286 started at Fri May 19 17:59:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2632: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4286 at Fri May 19 17:59:04 UTC 2017
kill -USR1 4286
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4286 killed at Fri May 19 17:59:04 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:59:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4396 >/dev/null 2>/dev/null
selfserv with PID 4396 found at Fri May 19 17:59:04 UTC 2017
selfserv with PID 4396 started at Fri May 19 17:59:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2633: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4396 at Fri May 19 17:59:06 UTC 2017
kill -USR1 4396
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4396 killed at Fri May 19 17:59:06 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:59:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4500 >/dev/null 2>/dev/null
selfserv with PID 4500 found at Fri May 19 17:59:06 UTC 2017
selfserv with PID 4500 started at Fri May 19 17:59:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2634: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4500 at Fri May 19 17:59:07 UTC 2017
kill -USR1 4500
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4500 killed at Fri May 19 17:59:07 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:59:07 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4557 >/dev/null 2>/dev/null
selfserv with PID 4557 found at Fri May 19 17:59:07 UTC 2017
selfserv with PID 4557 started at Fri May 19 17:59:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2635: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4557 at Fri May 19 17:59:09 UTC 2017
kill -USR1 4557
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4557 killed at Fri May 19 17:59:09 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 17:59:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4614 >/dev/null 2>/dev/null
selfserv with PID 4614 found at Fri May 19 17:59:09 UTC 2017
selfserv with PID 4614 started at Fri May 19 17:59:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2636: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4614 at Fri May 19 17:59:10 UTC 2017
kill -USR1 4614
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4614 killed at Fri May 19 17:59:10 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 17:59:10 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4671 >/dev/null 2>/dev/null
selfserv with PID 4671 found at Fri May 19 17:59:10 UTC 2017
selfserv with PID 4671 started at Fri May 19 17:59:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2637: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4671 at Fri May 19 17:59:12 UTC 2017
kill -USR1 4671
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4671 killed at Fri May 19 17:59:12 UTC 2017
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test Extended Test - server normal/client bypass  - with ECC ===============================
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Fri May 19 17:59:12 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4817 >/dev/null 2>/dev/null
selfserv with PID 4817 found at Fri May 19 17:59:13 UTC 2017
selfserv with PID 4817 started at Fri May 19 17:59:13 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 1000 -C c -V ssl3:ssl3 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:59:13 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:59:15 UTC 2017
ssl.sh: #2638: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4817 at Fri May 19 17:59:15 UTC 2017
kill -USR1 4817
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4817 killed at Fri May 19 17:59:15 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Fri May 19 17:59:15 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4898 >/dev/null 2>/dev/null
selfserv with PID 4898 found at Fri May 19 17:59:15 UTC 2017
selfserv with PID 4898 started at Fri May 19 17:59:15 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 1000 -C c \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:59:15 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:59:17 UTC 2017
ssl.sh: #2639: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4898 at Fri May 19 17:59:17 UTC 2017
kill -USR1 4898
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4898 killed at Fri May 19 17:59:17 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Fri May 19 17:59:17 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4972 >/dev/null 2>/dev/null
selfserv with PID 4972 found at Fri May 19 17:59:17 UTC 2017
selfserv with PID 4972 started at Fri May 19 17:59:17 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 1000 -C c -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:59:17 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:59:19 UTC 2017
ssl.sh: #2640: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4972 at Fri May 19 17:59:19 UTC 2017
kill -USR1 4972
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4972 killed at Fri May 19 17:59:19 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Fri May 19 17:59:19 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5046 >/dev/null 2>/dev/null
selfserv with PID 5046 found at Fri May 19 17:59:19 UTC 2017
selfserv with PID 5046 started at Fri May 19 17:59:19 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:59:19 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:59:21 UTC 2017
ssl.sh: #2641: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5046 at Fri May 19 17:59:21 UTC 2017
kill -USR1 5046
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5046 killed at Fri May 19 17:59:21 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Fri May 19 17:59:22 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5120 >/dev/null 2>/dev/null
selfserv with PID 5120 found at Fri May 19 17:59:22 UTC 2017
selfserv with PID 5120 started at Fri May 19 17:59:22 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:59:22 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:59:24 UTC 2017
ssl.sh: #2642: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5120 at Fri May 19 17:59:24 UTC 2017
kill -USR1 5120
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5120 killed at Fri May 19 17:59:24 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Fri May 19 17:59:24 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5194 >/dev/null 2>/dev/null
selfserv with PID 5194 found at Fri May 19 17:59:24 UTC 2017
selfserv with PID 5194 started at Fri May 19 17:59:24 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:59:24 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:59:27 UTC 2017
ssl.sh: #2643: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5194 at Fri May 19 17:59:27 UTC 2017
kill -USR1 5194
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5194 killed at Fri May 19 17:59:27 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Fri May 19 17:59:27 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5268 >/dev/null 2>/dev/null
selfserv with PID 5268 found at Fri May 19 17:59:27 UTC 2017
selfserv with PID 5268 started at Fri May 19 17:59:27 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:59:27 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 17:59:30 UTC 2017
ssl.sh: #2644: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5268 at Fri May 19 17:59:30 UTC 2017
kill -USR1 5268
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5268 killed at Fri May 19 17:59:30 UTC 2017
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Fri May 19 17:59:30 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5359 >/dev/null 2>/dev/null
selfserv with PID 5359 found at Fri May 19 17:59:30 UTC 2017
selfserv with PID 5359 started at Fri May 19 17:59:30 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:59:30 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:59:35 UTC 2017
ssl.sh: #2645: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5359 at Fri May 19 17:59:35 UTC 2017
kill -USR1 5359
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5359 killed at Fri May 19 17:59:35 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Fri May 19 17:59:36 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5432 >/dev/null 2>/dev/null
selfserv with PID 5432 found at Fri May 19 17:59:36 UTC 2017
selfserv with PID 5432 started at Fri May 19 17:59:36 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:59:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 17:59:41 UTC 2017
ssl.sh: #2646: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5432 at Fri May 19 17:59:41 UTC 2017
kill -USR1 5432
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5432 killed at Fri May 19 17:59:41 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Fri May 19 17:59:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5505 >/dev/null 2>/dev/null
selfserv with PID 5505 found at Fri May 19 17:59:41 UTC 2017
selfserv with PID 5505 started at Fri May 19 17:59:41 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:59:41 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 17:59:42 UTC 2017
ssl.sh: #2647: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5505 at Fri May 19 17:59:42 UTC 2017
kill -USR1 5505
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5505 killed at Fri May 19 17:59:42 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Fri May 19 17:59:42 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5579 >/dev/null 2>/dev/null
selfserv with PID 5579 found at Fri May 19 17:59:42 UTC 2017
selfserv with PID 5579 started at Fri May 19 17:59:42 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:59:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:59:43 UTC 2017
ssl.sh: #2648: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5579 at Fri May 19 17:59:44 UTC 2017
kill -USR1 5579
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5579 killed at Fri May 19 17:59:44 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Fri May 19 17:59:44 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5721 >/dev/null 2>/dev/null
selfserv with PID 5721 found at Fri May 19 17:59:44 UTC 2017
selfserv with PID 5721 started at Fri May 19 17:59:44 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:59:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 17:59:45 UTC 2017
ssl.sh: #2649: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5721 at Fri May 19 17:59:45 UTC 2017
kill -USR1 5721
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5721 killed at Fri May 19 17:59:45 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Fri May 19 17:59:45 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5795 >/dev/null 2>/dev/null
selfserv with PID 5795 found at Fri May 19 17:59:45 UTC 2017
selfserv with PID 5795 started at Fri May 19 17:59:45 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:59:45 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 17:59:46 UTC 2017
ssl.sh: #2650: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5795 at Fri May 19 17:59:47 UTC 2017
kill -USR1 5795
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5795 killed at Fri May 19 17:59:47 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Fri May 19 17:59:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5869 >/dev/null 2>/dev/null
selfserv with PID 5869 found at Fri May 19 17:59:47 UTC 2017
selfserv with PID 5869 started at Fri May 19 17:59:47 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:59:47 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 17:59:48 UTC 2017
ssl.sh: #2651: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5869 at Fri May 19 17:59:48 UTC 2017
kill -USR1 5869
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5869 killed at Fri May 19 17:59:48 UTC 2017
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Fri May 19 17:59:48 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 17:59:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5962 >/dev/null 2>/dev/null
selfserv with PID 5962 found at Fri May 19 17:59:48 UTC 2017
selfserv with PID 5962 started at Fri May 19 17:59:48 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 17:59:48 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:00:00 UTC 2017
ssl.sh: #2652: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5962 at Fri May 19 18:00:00 UTC 2017
kill -USR1 5962
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5962 killed at Fri May 19 18:00:00 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ----
selfserv starting at Fri May 19 18:00:00 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C023 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:00:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6035 >/dev/null 2>/dev/null
selfserv with PID 6035 found at Fri May 19 18:00:00 UTC 2017
selfserv with PID 6035 started at Fri May 19 18:00:00 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:00:00 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:00:11 UTC 2017
ssl.sh: #2653: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6035 at Fri May 19 18:00:11 UTC 2017
kill -USR1 6035
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6035 killed at Fri May 19 18:00:11 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) ----
selfserv starting at Fri May 19 18:00:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02B -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:00:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6110 >/dev/null 2>/dev/null
selfserv with PID 6110 found at Fri May 19 18:00:11 UTC 2017
selfserv with PID 6110 started at Fri May 19 18:00:11 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:00:11 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:00:23 UTC 2017
ssl.sh: #2654: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6110 at Fri May 19 18:00:23 UTC 2017
kill -USR1 6110
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6110 killed at Fri May 19 18:00:23 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Fri May 19 18:00:23 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:00:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6183 >/dev/null 2>/dev/null
selfserv with PID 6183 found at Fri May 19 18:00:23 UTC 2017
selfserv with PID 6183 started at Fri May 19 18:00:23 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:00:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:00:34 UTC 2017
ssl.sh: #2655: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6183 at Fri May 19 18:00:34 UTC 2017
kill -USR1 6183
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6183 killed at Fri May 19 18:00:34 UTC 2017
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Fri May 19 18:00:34 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C00E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:00:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6256 >/dev/null 2>/dev/null
selfserv with PID 6256 found at Fri May 19 18:00:34 UTC 2017
selfserv with PID 6256 started at Fri May 19 18:00:34 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:00:34 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:00:37 UTC 2017
ssl.sh: #2656: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6256 at Fri May 19 18:00:37 UTC 2017
kill -USR1 6256
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6256 killed at Fri May 19 18:00:37 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Fri May 19 18:00:37 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:00:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6329 >/dev/null 2>/dev/null
selfserv with PID 6329 found at Fri May 19 18:00:37 UTC 2017
selfserv with PID 6329 started at Fri May 19 18:00:37 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:00:37 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:00:39 UTC 2017
ssl.sh: #2657: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6329 at Fri May 19 18:00:39 UTC 2017
kill -USR1 6329
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6329 killed at Fri May 19 18:00:39 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 ----
selfserv starting at Fri May 19 18:00:39 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C027 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:00:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6403 >/dev/null 2>/dev/null
selfserv with PID 6403 found at Fri May 19 18:00:39 UTC 2017
selfserv with PID 6403 started at Fri May 19 18:00:39 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:00:39 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:00:42 UTC 2017
ssl.sh: #2658: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6403 at Fri May 19 18:00:42 UTC 2017
kill -USR1 6403
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6403 killed at Fri May 19 18:00:42 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 GCM ----
selfserv starting at Fri May 19 18:00:42 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02F -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:00:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6477 >/dev/null 2>/dev/null
selfserv with PID 6477 found at Fri May 19 18:00:42 UTC 2017
selfserv with PID 6477 started at Fri May 19 18:00:42 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:00:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:00:44 UTC 2017
ssl.sh: #2659: Stress TLS  ECDHE-RSA   AES 128 GCM produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6477 at Fri May 19 18:00:44 UTC 2017
kill -USR1 6477
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6477 killed at Fri May 19 18:00:44 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Fri May 19 18:00:44 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:00:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6551 >/dev/null 2>/dev/null
selfserv with PID 6551 found at Fri May 19 18:00:44 UTC 2017
selfserv with PID 6551 started at Fri May 19 18:00:44 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:00:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 18:00:47 UTC 2017
ssl.sh: #2660: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6551 at Fri May 19 18:00:47 UTC 2017
kill -USR1 6551
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6551 killed at Fri May 19 18:00:47 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Fri May 19 18:00:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:00:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6625 >/dev/null 2>/dev/null
selfserv with PID 6625 found at Fri May 19 18:00:47 UTC 2017
selfserv with PID 6625 started at Fri May 19 18:00:47 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:00:47 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:00:48 UTC 2017
ssl.sh: #2661: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6625 at Fri May 19 18:00:48 UTC 2017
kill -USR1 6625
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6625 killed at Fri May 19 18:00:48 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:00:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:00:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6714 >/dev/null 2>/dev/null
selfserv with PID 6714 found at Fri May 19 18:00:49 UTC 2017
selfserv with PID 6714 started at Fri May 19 18:00:49 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:00:49 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 18:00:52 UTC 2017
ssl.sh: #2662: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6714 at Fri May 19 18:00:52 UTC 2017
kill -USR1 6714
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6714 killed at Fri May 19 18:00:52 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Fri May 19 18:00:52 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:00:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6787 >/dev/null 2>/dev/null
selfserv with PID 6787 found at Fri May 19 18:00:52 UTC 2017
selfserv with PID 6787 started at Fri May 19 18:00:52 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:00:52 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:00:53 UTC 2017
ssl.sh: #2663: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6787 at Fri May 19 18:00:53 UTC 2017
kill -USR1 6787
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6787 killed at Fri May 19 18:00:53 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:00:54 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:00:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6861 >/dev/null 2>/dev/null
selfserv with PID 6861 found at Fri May 19 18:00:54 UTC 2017
selfserv with PID 6861 started at Fri May 19 18:00:54 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:00:54 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 18:00:56 UTC 2017
ssl.sh: #2664: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6861 at Fri May 19 18:00:57 UTC 2017
kill -USR1 6861
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6861 killed at Fri May 19 18:00:57 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:00:57 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:00:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6934 >/dev/null 2>/dev/null
selfserv with PID 6934 found at Fri May 19 18:00:57 UTC 2017
selfserv with PID 6934 started at Fri May 19 18:00:57 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:00:57 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 18:00:58 UTC 2017
ssl.sh: #2665: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6934 at Fri May 19 18:00:58 UTC 2017
kill -USR1 6934
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6934 killed at Fri May 19 18:00:58 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Fri May 19 18:00:58 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:00:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7007 >/dev/null 2>/dev/null
selfserv with PID 7007 found at Fri May 19 18:00:58 UTC 2017
selfserv with PID 7007 started at Fri May 19 18:00:58 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:00:58 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:00:59 UTC 2017
ssl.sh: #2666: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7007 at Fri May 19 18:01:00 UTC 2017
kill -USR1 7007
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7007 killed at Fri May 19 18:01:00 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Fri May 19 18:01:00 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:01:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7081 >/dev/null 2>/dev/null
selfserv with PID 7081 found at Fri May 19 18:01:00 UTC 2017
selfserv with PID 7081 started at Fri May 19 18:01:00 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:01:00 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:01:01 UTC 2017
ssl.sh: #2667: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7081 at Fri May 19 18:01:01 UTC 2017
kill -USR1 7081
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7081 killed at Fri May 19 18:01:01 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ----
selfserv starting at Fri May 19 18:01:01 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0016 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:01:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7170 >/dev/null 2>/dev/null
selfserv with PID 7170 found at Fri May 19 18:01:01 UTC 2017
selfserv with PID 7170 started at Fri May 19 18:01:01 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:01:02 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:01:07 UTC 2017
ssl.sh: #2668: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7170 at Fri May 19 18:01:07 UTC 2017
kill -USR1 7170
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7170 killed at Fri May 19 18:01:07 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ----
selfserv starting at Fri May 19 18:01:07 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0033 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:01:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7243 >/dev/null 2>/dev/null
selfserv with PID 7243 found at Fri May 19 18:01:07 UTC 2017
selfserv with PID 7243 started at Fri May 19 18:01:07 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:01:07 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:01:10 UTC 2017
ssl.sh: #2669: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7243 at Fri May 19 18:01:10 UTC 2017
kill -USR1 7243
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7243 killed at Fri May 19 18:01:10 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Fri May 19 18:01:10 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0039 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:01:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7317 >/dev/null 2>/dev/null
selfserv with PID 7317 found at Fri May 19 18:01:10 UTC 2017
selfserv with PID 7317 started at Fri May 19 18:01:10 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:01:10 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:01:16 UTC 2017
ssl.sh: #2670: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7317 at Fri May 19 18:01:16 UTC 2017
kill -USR1 7317
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7317 killed at Fri May 19 18:01:16 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ----
selfserv starting at Fri May 19 18:01:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0040 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:01:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7390 >/dev/null 2>/dev/null
selfserv with PID 7390 found at Fri May 19 18:01:16 UTC 2017
selfserv with PID 7390 started at Fri May 19 18:01:16 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:01:16 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:01:26 UTC 2017
ssl.sh: #2671: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7390 at Fri May 19 18:01:26 UTC 2017
kill -USR1 7390
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7390 killed at Fri May 19 18:01:26 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Fri May 19 18:01:26 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0038 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:01:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7473 >/dev/null 2>/dev/null
selfserv with PID 7473 found at Fri May 19 18:01:26 UTC 2017
selfserv with PID 7473 started at Fri May 19 18:01:26 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:01:26 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 18:02:53 UTC 2017
ssl.sh: #2672: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7473 at Fri May 19 18:02:53 UTC 2017
kill -USR1 7473
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7473 killed at Fri May 19 18:02:53 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ----
selfserv starting at Fri May 19 18:02:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006A -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:02:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7558 >/dev/null 2>/dev/null
selfserv with PID 7558 found at Fri May 19 18:02:53 UTC 2017
selfserv with PID 7558 started at Fri May 19 18:02:53 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:02:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 18:04:22 UTC 2017
ssl.sh: #2673: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7558 at Fri May 19 18:04:22 UTC 2017
kill -USR1 7558
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7558 killed at Fri May 19 18:04:22 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ----
selfserv starting at Fri May 19 18:04:23 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006B -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:04:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7960 >/dev/null 2>/dev/null
selfserv with PID 7960 found at Fri May 19 18:04:23 UTC 2017
selfserv with PID 7960 started at Fri May 19 18:04:23 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:04:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:04:29 UTC 2017
ssl.sh: #2674: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7960 at Fri May 19 18:04:29 UTC 2017
kill -USR1 7960
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7960 killed at Fri May 19 18:04:29 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ----
selfserv starting at Fri May 19 18:04:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:04:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8033 >/dev/null 2>/dev/null
selfserv with PID 8033 found at Fri May 19 18:04:29 UTC 2017
selfserv with PID 8033 started at Fri May 19 18:04:29 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:04:29 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:04:35 UTC 2017
ssl.sh: #2675: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8033 at Fri May 19 18:04:35 UTC 2017
kill -USR1 8033
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8033 killed at Fri May 19 18:04:35 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ----
selfserv starting at Fri May 19 18:04:35 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009F -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:04:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8106 >/dev/null 2>/dev/null
selfserv with PID 8106 found at Fri May 19 18:04:35 UTC 2017
selfserv with PID 8106 started at Fri May 19 18:04:35 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:04:35 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:04:41 UTC 2017
ssl.sh: #2676: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8106 at Fri May 19 18:04:41 UTC 2017
kill -USR1 8106
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8106 killed at Fri May 19 18:04:41 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:04:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:04:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8194 >/dev/null 2>/dev/null
selfserv with PID 8194 found at Fri May 19 18:04:41 UTC 2017
selfserv with PID 8194 started at Fri May 19 18:04:41 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:04:41 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:04:57 UTC 2017
ssl.sh: #2677: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8194 at Fri May 19 18:04:57 UTC 2017
kill -USR1 8194
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8194 killed at Fri May 19 18:04:57 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Fri May 19 18:04:57 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:04:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8267 >/dev/null 2>/dev/null
selfserv with PID 8267 found at Fri May 19 18:04:57 UTC 2017
selfserv with PID 8267 started at Fri May 19 18:04:57 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:04:57 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:05:00 UTC 2017
ssl.sh: #2678: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8267 at Fri May 19 18:05:00 UTC 2017
kill -USR1 8267
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8267 killed at Fri May 19 18:05:00 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Fri May 19 18:05:00 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:05:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8357 >/dev/null 2>/dev/null
selfserv with PID 8357 found at Fri May 19 18:05:00 UTC 2017
selfserv with PID 8357 started at Fri May 19 18:05:00 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:05:00 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 18:07:29 UTC 2017
ssl.sh: #2679: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8357 at Fri May 19 18:07:29 UTC 2017
kill -USR1 8357
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8357 killed at Fri May 19 18:07:29 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Fri May 19 18:07:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:07:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8476 >/dev/null 2>/dev/null
selfserv with PID 8476 found at Fri May 19 18:07:29 UTC 2017
selfserv with PID 8476 started at Fri May 19 18:07:29 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:07:29 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 18:09:58 UTC 2017
ssl.sh: #2680: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8476 at Fri May 19 18:09:58 UTC 2017
kill -USR1 8476
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8476 killed at Fri May 19 18:09:58 UTC 2017
ssl.sh: SSL - FIPS mode on for server ===============================
ssl.sh: Turning FIPS on for the  server
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -fips true -force
FIPS mode enabled.
ssl.sh: #2681:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -list
ssl.sh: #2682:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2683:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: Turning FIPS on for the extended  server
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -fips true -force
FIPS mode enabled.
ssl.sh: #2684:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -list
ssl.sh: #2685:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2686:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: SSL Cipher Coverage  - server fips/client normal  - with ECC ===============================
selfserv starting at Fri May 19 18:10:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:10:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:01 UTC 2017
selfserv with PID 8959 started at Fri May 19 18:10:01 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2687: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2688: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2689: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2690: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2691: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2692: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2693: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2694: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2695: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2696: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2697: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2698: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2699: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2700: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2701: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2702: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2703: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2704: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2705: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2706: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2707: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2708: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2709: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2710: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2711: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2712: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2713: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2714: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2715: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2716: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2717: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2718: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2719: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2720: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2721: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2722: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2723: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2724: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2725: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  l    TLS12_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  m    TLS12_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2726: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2727: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2728: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2729: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2730: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2731: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2732: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2733: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2734: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2735: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2736: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2737: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2738: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2739: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2740: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2741: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2742: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2743: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2744: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2745: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2746: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2747: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2748: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2749: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2750: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2751: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2752: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2753: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2754: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8959 >/dev/null 2>/dev/null
selfserv with PID 8959 found at Fri May 19 18:10:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2755: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8959 at Fri May 19 18:10:24 UTC 2017
kill -USR1 8959
selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8959 killed at Fri May 19 18:10:24 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:10:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:10:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10607 >/dev/null 2>/dev/null
selfserv with PID 10607 found at Fri May 19 18:10:24 UTC 2017
selfserv with PID 10607 started at Fri May 19 18:10:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2756: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 10607 >/dev/null 2>/dev/null
selfserv with PID 10607 found at Fri May 19 18:10:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2757: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10607 >/dev/null 2>/dev/null
selfserv with PID 10607 found at Fri May 19 18:10:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2758: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10607 >/dev/null 2>/dev/null
selfserv with PID 10607 found at Fri May 19 18:10:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2759: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10607 >/dev/null 2>/dev/null
selfserv with PID 10607 found at Fri May 19 18:10:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2760: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 10607 at Fri May 19 18:10:27 UTC 2017
kill -USR1 10607
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10607 killed at Fri May 19 18:10:27 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:10:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:10:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10745 >/dev/null 2>/dev/null
selfserv with PID 10745 found at Fri May 19 18:10:27 UTC 2017
selfserv with PID 10745 started at Fri May 19 18:10:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2761: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 10745 >/dev/null 2>/dev/null
selfserv with PID 10745 found at Fri May 19 18:10:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2762: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10745 >/dev/null 2>/dev/null
selfserv with PID 10745 found at Fri May 19 18:10:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2763: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10745 >/dev/null 2>/dev/null
selfserv with PID 10745 found at Fri May 19 18:10:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2764: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10745 >/dev/null 2>/dev/null
selfserv with PID 10745 found at Fri May 19 18:10:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2765: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 10745 >/dev/null 2>/dev/null
selfserv with PID 10745 found at Fri May 19 18:10:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2766: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 10745 >/dev/null 2>/dev/null
selfserv with PID 10745 found at Fri May 19 18:10:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2767: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10745 >/dev/null 2>/dev/null
selfserv with PID 10745 found at Fri May 19 18:10:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2768: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10745 >/dev/null 2>/dev/null
selfserv with PID 10745 found at Fri May 19 18:10:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2769: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10745 >/dev/null 2>/dev/null
selfserv with PID 10745 found at Fri May 19 18:10:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2770: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 10745 >/dev/null 2>/dev/null
selfserv with PID 10745 found at Fri May 19 18:10:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2771: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 10745 >/dev/null 2>/dev/null
selfserv with PID 10745 found at Fri May 19 18:10:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2772: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10745 >/dev/null 2>/dev/null
selfserv with PID 10745 found at Fri May 19 18:10:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2773: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10745 >/dev/null 2>/dev/null
selfserv with PID 10745 found at Fri May 19 18:10:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2774: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10745 >/dev/null 2>/dev/null
selfserv with PID 10745 found at Fri May 19 18:10:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2775: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 10745 at Fri May 19 18:10:34 UTC 2017
kill -USR1 10745
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10745 killed at Fri May 19 18:10:34 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:10:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:10:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11100 >/dev/null 2>/dev/null
selfserv with PID 11100 found at Fri May 19 18:10:34 UTC 2017
selfserv with PID 11100 started at Fri May 19 18:10:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2776: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 11100 >/dev/null 2>/dev/null
selfserv with PID 11100 found at Fri May 19 18:10:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2777: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11100 >/dev/null 2>/dev/null
selfserv with PID 11100 found at Fri May 19 18:10:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2778: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11100 >/dev/null 2>/dev/null
selfserv with PID 11100 found at Fri May 19 18:10:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2779: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11100 >/dev/null 2>/dev/null
selfserv with PID 11100 found at Fri May 19 18:10:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2780: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 11100 at Fri May 19 18:10:37 UTC 2017
kill -USR1 11100
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11100 killed at Fri May 19 18:10:37 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:10:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:10:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11238 >/dev/null 2>/dev/null
selfserv with PID 11238 found at Fri May 19 18:10:37 UTC 2017
selfserv with PID 11238 started at Fri May 19 18:10:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2781: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 11238 >/dev/null 2>/dev/null
selfserv with PID 11238 found at Fri May 19 18:10:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2782: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11238 >/dev/null 2>/dev/null
selfserv with PID 11238 found at Fri May 19 18:10:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2783: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11238 >/dev/null 2>/dev/null
selfserv with PID 11238 found at Fri May 19 18:10:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2784: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11238 >/dev/null 2>/dev/null
selfserv with PID 11238 found at Fri May 19 18:10:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2785: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 11238 >/dev/null 2>/dev/null
selfserv with PID 11238 found at Fri May 19 18:10:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2786: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 11238 >/dev/null 2>/dev/null
selfserv with PID 11238 found at Fri May 19 18:10:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2787: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11238 >/dev/null 2>/dev/null
selfserv with PID 11238 found at Fri May 19 18:10:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2788: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11238 >/dev/null 2>/dev/null
selfserv with PID 11238 found at Fri May 19 18:10:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2789: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11238 >/dev/null 2>/dev/null
selfserv with PID 11238 found at Fri May 19 18:10:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2790: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 11238 >/dev/null 2>/dev/null
selfserv with PID 11238 found at Fri May 19 18:10:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2791: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 11238 >/dev/null 2>/dev/null
selfserv with PID 11238 found at Fri May 19 18:10:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2792: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11238 >/dev/null 2>/dev/null
selfserv with PID 11238 found at Fri May 19 18:10:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2793: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11238 >/dev/null 2>/dev/null
selfserv with PID 11238 found at Fri May 19 18:10:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2794: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11238 >/dev/null 2>/dev/null
selfserv with PID 11238 found at Fri May 19 18:10:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2795: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 11238 at Fri May 19 18:10:43 UTC 2017
kill -USR1 11238
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11238 killed at Fri May 19 18:10:43 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:10:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:10:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11591 >/dev/null 2>/dev/null
selfserv with PID 11591 found at Fri May 19 18:10:44 UTC 2017
selfserv with PID 11591 started at Fri May 19 18:10:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2796: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 11591 >/dev/null 2>/dev/null
selfserv with PID 11591 found at Fri May 19 18:10:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2797: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11591 >/dev/null 2>/dev/null
selfserv with PID 11591 found at Fri May 19 18:10:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2798: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11591 >/dev/null 2>/dev/null
selfserv with PID 11591 found at Fri May 19 18:10:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2799: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11591 >/dev/null 2>/dev/null
selfserv with PID 11591 found at Fri May 19 18:10:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2800: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 11591 at Fri May 19 18:10:46 UTC 2017
kill -USR1 11591
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11591 killed at Fri May 19 18:10:47 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:10:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:10:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11729 >/dev/null 2>/dev/null
selfserv with PID 11729 found at Fri May 19 18:10:47 UTC 2017
selfserv with PID 11729 started at Fri May 19 18:10:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2801: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 11729 >/dev/null 2>/dev/null
selfserv with PID 11729 found at Fri May 19 18:10:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2802: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11729 >/dev/null 2>/dev/null
selfserv with PID 11729 found at Fri May 19 18:10:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2803: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11729 >/dev/null 2>/dev/null
selfserv with PID 11729 found at Fri May 19 18:10:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2804: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11729 >/dev/null 2>/dev/null
selfserv with PID 11729 found at Fri May 19 18:10:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2805: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 11729 >/dev/null 2>/dev/null
selfserv with PID 11729 found at Fri May 19 18:10:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2806: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 11729 >/dev/null 2>/dev/null
selfserv with PID 11729 found at Fri May 19 18:10:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2807: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 11729 >/dev/null 2>/dev/null
selfserv with PID 11729 found at Fri May 19 18:10:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2808: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 11729 >/dev/null 2>/dev/null
selfserv with PID 11729 found at Fri May 19 18:10:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2809: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 11729 >/dev/null 2>/dev/null
selfserv with PID 11729 found at Fri May 19 18:10:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2810: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 11729 >/dev/null 2>/dev/null
selfserv with PID 11729 found at Fri May 19 18:10:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2811: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 11729 >/dev/null 2>/dev/null
selfserv with PID 11729 found at Fri May 19 18:10:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2812: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 11729 >/dev/null 2>/dev/null
selfserv with PID 11729 found at Fri May 19 18:10:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2813: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 11729 >/dev/null 2>/dev/null
selfserv with PID 11729 found at Fri May 19 18:10:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2814: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 11729 >/dev/null 2>/dev/null
selfserv with PID 11729 found at Fri May 19 18:10:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2815: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11729 at Fri May 19 18:10:53 UTC 2017
kill -USR1 11729
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11729 killed at Fri May 19 18:10:53 UTC 2017
ssl.sh: SSL Client Authentication  - server fips/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 18:10:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:10:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12130 >/dev/null 2>/dev/null
selfserv with PID 12130 found at Fri May 19 18:10:53 UTC 2017
selfserv with PID 12130 started at Fri May 19 18:10:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2816: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12130 at Fri May 19 18:10:55 UTC 2017
kill -USR1 12130
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12130 killed at Fri May 19 18:10:55 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Fri May 19 18:10:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:10:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12187 >/dev/null 2>/dev/null
selfserv with PID 12187 found at Fri May 19 18:10:55 UTC 2017
selfserv with PID 12187 started at Fri May 19 18:10:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2817: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12187 at Fri May 19 18:10:57 UTC 2017
kill -USR1 12187
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12187 killed at Fri May 19 18:10:57 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Fri May 19 18:10:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:10:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12244 >/dev/null 2>/dev/null
selfserv with PID 12244 found at Fri May 19 18:10:57 UTC 2017
selfserv with PID 12244 started at Fri May 19 18:10:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2818: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12244 at Fri May 19 18:10:58 UTC 2017
kill -USR1 12244
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12244 killed at Fri May 19 18:10:58 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 18:10:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:10:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12301 >/dev/null 2>/dev/null
selfserv with PID 12301 found at Fri May 19 18:10:59 UTC 2017
selfserv with PID 12301 started at Fri May 19 18:10:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2819: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12301 at Fri May 19 18:11:00 UTC 2017
kill -USR1 12301
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12301 killed at Fri May 19 18:11:00 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Fri May 19 18:11:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12358 >/dev/null 2>/dev/null
selfserv with PID 12358 found at Fri May 19 18:11:00 UTC 2017
selfserv with PID 12358 started at Fri May 19 18:11:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2820: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12358 at Fri May 19 18:11:02 UTC 2017
kill -USR1 12358
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12358 killed at Fri May 19 18:11:02 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Fri May 19 18:11:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12415 >/dev/null 2>/dev/null
selfserv with PID 12415 found at Fri May 19 18:11:02 UTC 2017
selfserv with PID 12415 started at Fri May 19 18:11:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2821: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12415 at Fri May 19 18:11:04 UTC 2017
kill -USR1 12415
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12415 killed at Fri May 19 18:11:04 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 18:11:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12472 >/dev/null 2>/dev/null
selfserv with PID 12472 found at Fri May 19 18:11:04 UTC 2017
selfserv with PID 12472 started at Fri May 19 18:11:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2822: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12472 at Fri May 19 18:11:05 UTC 2017
kill -USR1 12472
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12472 killed at Fri May 19 18:11:05 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Fri May 19 18:11:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12529 >/dev/null 2>/dev/null
selfserv with PID 12529 found at Fri May 19 18:11:06 UTC 2017
selfserv with PID 12529 started at Fri May 19 18:11:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2823: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12529 at Fri May 19 18:11:07 UTC 2017
kill -USR1 12529
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12529 killed at Fri May 19 18:11:07 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Fri May 19 18:11:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12586 >/dev/null 2>/dev/null
selfserv with PID 12586 found at Fri May 19 18:11:07 UTC 2017
selfserv with PID 12586 started at Fri May 19 18:11:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2824: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12586 at Fri May 19 18:11:09 UTC 2017
kill -USR1 12586
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12586 killed at Fri May 19 18:11:09 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 18:11:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12643 >/dev/null 2>/dev/null
selfserv with PID 12643 found at Fri May 19 18:11:09 UTC 2017
selfserv with PID 12643 started at Fri May 19 18:11:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2825: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12643 at Fri May 19 18:11:10 UTC 2017
kill -USR1 12643
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12643 killed at Fri May 19 18:11:10 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Fri May 19 18:11:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12700 >/dev/null 2>/dev/null
selfserv with PID 12700 found at Fri May 19 18:11:11 UTC 2017
selfserv with PID 12700 started at Fri May 19 18:11:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2826: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12700 at Fri May 19 18:11:12 UTC 2017
kill -USR1 12700
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12700 killed at Fri May 19 18:11:12 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Fri May 19 18:11:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12757 >/dev/null 2>/dev/null
selfserv with PID 12757 found at Fri May 19 18:11:12 UTC 2017
selfserv with PID 12757 started at Fri May 19 18:11:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2827: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12757 at Fri May 19 18:11:14 UTC 2017
kill -USR1 12757
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12757 killed at Fri May 19 18:11:14 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 18:11:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12814 >/dev/null 2>/dev/null
selfserv with PID 12814 found at Fri May 19 18:11:14 UTC 2017
selfserv with PID 12814 started at Fri May 19 18:11:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2828: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12814 at Fri May 19 18:11:16 UTC 2017
kill -USR1 12814
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12814 killed at Fri May 19 18:11:16 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 18:11:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12871 >/dev/null 2>/dev/null
selfserv with PID 12871 found at Fri May 19 18:11:16 UTC 2017
selfserv with PID 12871 started at Fri May 19 18:11:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2829: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12871 at Fri May 19 18:11:17 UTC 2017
kill -USR1 12871
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12871 killed at Fri May 19 18:11:17 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 18:11:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12928 >/dev/null 2>/dev/null
selfserv with PID 12928 found at Fri May 19 18:11:18 UTC 2017
selfserv with PID 12928 started at Fri May 19 18:11:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2830: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12928 at Fri May 19 18:11:19 UTC 2017
kill -USR1 12928
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12928 killed at Fri May 19 18:11:19 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 18:11:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12985 >/dev/null 2>/dev/null
selfserv with PID 12985 found at Fri May 19 18:11:20 UTC 2017
selfserv with PID 12985 started at Fri May 19 18:11:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2831: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12985 at Fri May 19 18:11:21 UTC 2017
kill -USR1 12985
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12985 killed at Fri May 19 18:11:21 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 18:11:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13042 >/dev/null 2>/dev/null
selfserv with PID 13042 found at Fri May 19 18:11:22 UTC 2017
selfserv with PID 13042 started at Fri May 19 18:11:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2832: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13042 at Fri May 19 18:11:23 UTC 2017
kill -USR1 13042
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13042 killed at Fri May 19 18:11:23 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 18:11:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13099 >/dev/null 2>/dev/null
selfserv with PID 13099 found at Fri May 19 18:11:23 UTC 2017
selfserv with PID 13099 started at Fri May 19 18:11:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2833: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13099 at Fri May 19 18:11:25 UTC 2017
kill -USR1 13099
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13099 killed at Fri May 19 18:11:25 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 18:11:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13156 >/dev/null 2>/dev/null
selfserv with PID 13156 found at Fri May 19 18:11:25 UTC 2017
selfserv with PID 13156 started at Fri May 19 18:11:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2834: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13156 at Fri May 19 18:11:27 UTC 2017
kill -USR1 13156
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13156 killed at Fri May 19 18:11:27 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 18:11:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13213 >/dev/null 2>/dev/null
selfserv with PID 13213 found at Fri May 19 18:11:28 UTC 2017
selfserv with PID 13213 started at Fri May 19 18:11:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2835: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13213 at Fri May 19 18:11:29 UTC 2017
kill -USR1 13213
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13213 killed at Fri May 19 18:11:29 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 18:11:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13270 >/dev/null 2>/dev/null
selfserv with PID 13270 found at Fri May 19 18:11:30 UTC 2017
selfserv with PID 13270 started at Fri May 19 18:11:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2836: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13270 at Fri May 19 18:11:32 UTC 2017
kill -USR1 13270
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13270 killed at Fri May 19 18:11:32 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 18:11:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13327 >/dev/null 2>/dev/null
selfserv with PID 13327 found at Fri May 19 18:11:32 UTC 2017
selfserv with PID 13327 started at Fri May 19 18:11:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2837: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13327 at Fri May 19 18:11:34 UTC 2017
kill -USR1 13327
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13327 killed at Fri May 19 18:11:34 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 18:11:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13384 >/dev/null 2>/dev/null
selfserv with PID 13384 found at Fri May 19 18:11:34 UTC 2017
selfserv with PID 13384 started at Fri May 19 18:11:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2838: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13384 at Fri May 19 18:11:36 UTC 2017
kill -USR1 13384
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13384 killed at Fri May 19 18:11:36 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 18:11:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13441 >/dev/null 2>/dev/null
selfserv with PID 13441 found at Fri May 19 18:11:36 UTC 2017
selfserv with PID 13441 started at Fri May 19 18:11:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2839: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13441 at Fri May 19 18:11:38 UTC 2017
kill -USR1 13441
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13441 killed at Fri May 19 18:11:38 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 18:11:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13498 >/dev/null 2>/dev/null
selfserv with PID 13498 found at Fri May 19 18:11:38 UTC 2017
selfserv with PID 13498 started at Fri May 19 18:11:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2840: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13498 at Fri May 19 18:11:40 UTC 2017
kill -USR1 13498
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13498 killed at Fri May 19 18:11:40 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 18:11:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13555 >/dev/null 2>/dev/null
selfserv with PID 13555 found at Fri May 19 18:11:40 UTC 2017
selfserv with PID 13555 started at Fri May 19 18:11:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2841: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13555 at Fri May 19 18:11:42 UTC 2017
kill -USR1 13555
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13555 killed at Fri May 19 18:11:42 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 18:11:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13612 >/dev/null 2>/dev/null
selfserv with PID 13612 found at Fri May 19 18:11:42 UTC 2017
selfserv with PID 13612 started at Fri May 19 18:11:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2842: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13612 at Fri May 19 18:11:44 UTC 2017
kill -USR1 13612
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13612 killed at Fri May 19 18:11:44 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 18:11:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13669 >/dev/null 2>/dev/null
selfserv with PID 13669 found at Fri May 19 18:11:44 UTC 2017
selfserv with PID 13669 started at Fri May 19 18:11:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2843: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13669 at Fri May 19 18:11:45 UTC 2017
kill -USR1 13669
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13669 killed at Fri May 19 18:11:45 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 18:11:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13726 >/dev/null 2>/dev/null
selfserv with PID 13726 found at Fri May 19 18:11:46 UTC 2017
selfserv with PID 13726 started at Fri May 19 18:11:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2844: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13726 at Fri May 19 18:11:47 UTC 2017
kill -USR1 13726
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13726 killed at Fri May 19 18:11:47 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 18:11:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13783 >/dev/null 2>/dev/null
selfserv with PID 13783 found at Fri May 19 18:11:47 UTC 2017
selfserv with PID 13783 started at Fri May 19 18:11:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2845: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13783 at Fri May 19 18:11:49 UTC 2017
kill -USR1 13783
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13783 killed at Fri May 19 18:11:49 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 18:11:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13855 >/dev/null 2>/dev/null
selfserv with PID 13855 found at Fri May 19 18:11:49 UTC 2017
selfserv with PID 13855 started at Fri May 19 18:11:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2846: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13855 at Fri May 19 18:11:51 UTC 2017
kill -USR1 13855
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13855 killed at Fri May 19 18:11:51 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 18:11:51 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13912 >/dev/null 2>/dev/null
selfserv with PID 13912 found at Fri May 19 18:11:51 UTC 2017
selfserv with PID 13912 started at Fri May 19 18:11:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2847: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13912 at Fri May 19 18:11:53 UTC 2017
kill -USR1 13912
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13912 killed at Fri May 19 18:11:53 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 18:11:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13969 >/dev/null 2>/dev/null
selfserv with PID 13969 found at Fri May 19 18:11:53 UTC 2017
selfserv with PID 13969 started at Fri May 19 18:11:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2848: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13969 at Fri May 19 18:11:54 UTC 2017
kill -USR1 13969
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13969 killed at Fri May 19 18:11:54 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 18:11:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14026 >/dev/null 2>/dev/null
selfserv with PID 14026 found at Fri May 19 18:11:55 UTC 2017
selfserv with PID 14026 started at Fri May 19 18:11:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2849: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14026 at Fri May 19 18:11:56 UTC 2017
kill -USR1 14026
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14026 killed at Fri May 19 18:11:56 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 18:11:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14083 >/dev/null 2>/dev/null
selfserv with PID 14083 found at Fri May 19 18:11:57 UTC 2017
selfserv with PID 14083 started at Fri May 19 18:11:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2850: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14083 at Fri May 19 18:11:58 UTC 2017
kill -USR1 14083
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14083 killed at Fri May 19 18:11:58 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 18:11:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:11:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14140 >/dev/null 2>/dev/null
selfserv with PID 14140 found at Fri May 19 18:11:58 UTC 2017
selfserv with PID 14140 started at Fri May 19 18:11:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2851: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14140 at Fri May 19 18:12:00 UTC 2017
kill -USR1 14140
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14140 killed at Fri May 19 18:12:00 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 18:12:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14197 >/dev/null 2>/dev/null
selfserv with PID 14197 found at Fri May 19 18:12:00 UTC 2017
selfserv with PID 14197 started at Fri May 19 18:12:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2852: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14197 at Fri May 19 18:12:02 UTC 2017
kill -USR1 14197
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14197 killed at Fri May 19 18:12:02 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 18:12:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14254 >/dev/null 2>/dev/null
selfserv with PID 14254 found at Fri May 19 18:12:02 UTC 2017
selfserv with PID 14254 started at Fri May 19 18:12:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2853: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14254 at Fri May 19 18:12:03 UTC 2017
kill -USR1 14254
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14254 killed at Fri May 19 18:12:04 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 18:12:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14311 >/dev/null 2>/dev/null
selfserv with PID 14311 found at Fri May 19 18:12:04 UTC 2017
selfserv with PID 14311 started at Fri May 19 18:12:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2854: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14311 at Fri May 19 18:12:05 UTC 2017
kill -USR1 14311
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14311 killed at Fri May 19 18:12:05 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 18:12:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14368 >/dev/null 2>/dev/null
selfserv with PID 14368 found at Fri May 19 18:12:06 UTC 2017
selfserv with PID 14368 started at Fri May 19 18:12:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2855: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14368 at Fri May 19 18:12:08 UTC 2017
kill -USR1 14368
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14368 killed at Fri May 19 18:12:08 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 18:12:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14425 >/dev/null 2>/dev/null
selfserv with PID 14425 found at Fri May 19 18:12:08 UTC 2017
selfserv with PID 14425 started at Fri May 19 18:12:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2856: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14425 at Fri May 19 18:12:09 UTC 2017
kill -USR1 14425
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14425 killed at Fri May 19 18:12:10 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 18:12:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Fri May 19 18:12:10 UTC 2017
selfserv with PID 14482 started at Fri May 19 18:12:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2857: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14482 at Fri May 19 18:12:12 UTC 2017
kill -USR1 14482
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14482 killed at Fri May 19 18:12:12 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 18:12:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14539 >/dev/null 2>/dev/null
selfserv with PID 14539 found at Fri May 19 18:12:12 UTC 2017
selfserv with PID 14539 started at Fri May 19 18:12:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2858: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14539 at Fri May 19 18:12:14 UTC 2017
kill -USR1 14539
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14539 killed at Fri May 19 18:12:14 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 18:12:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14596 >/dev/null 2>/dev/null
selfserv with PID 14596 found at Fri May 19 18:12:14 UTC 2017
selfserv with PID 14596 started at Fri May 19 18:12:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2859: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14596 at Fri May 19 18:12:16 UTC 2017
kill -USR1 14596
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14596 killed at Fri May 19 18:12:16 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 18:12:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14653 >/dev/null 2>/dev/null
selfserv with PID 14653 found at Fri May 19 18:12:16 UTC 2017
selfserv with PID 14653 started at Fri May 19 18:12:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2860: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14653 at Fri May 19 18:12:18 UTC 2017
kill -USR1 14653
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14653 killed at Fri May 19 18:12:18 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 18:12:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14711 >/dev/null 2>/dev/null
selfserv with PID 14711 found at Fri May 19 18:12:18 UTC 2017
selfserv with PID 14711 started at Fri May 19 18:12:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2861: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14711 at Fri May 19 18:12:21 UTC 2017
kill -USR1 14711
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14711 killed at Fri May 19 18:12:21 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 18:12:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14768 >/dev/null 2>/dev/null
selfserv with PID 14768 found at Fri May 19 18:12:21 UTC 2017
selfserv with PID 14768 started at Fri May 19 18:12:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2862: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14768 at Fri May 19 18:12:22 UTC 2017
kill -USR1 14768
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14768 killed at Fri May 19 18:12:23 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 18:12:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14825 >/dev/null 2>/dev/null
selfserv with PID 14825 found at Fri May 19 18:12:23 UTC 2017
selfserv with PID 14825 started at Fri May 19 18:12:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2863: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14825 at Fri May 19 18:12:25 UTC 2017
kill -USR1 14825
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14825 killed at Fri May 19 18:12:25 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 18:12:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14882 >/dev/null 2>/dev/null
selfserv with PID 14882 found at Fri May 19 18:12:25 UTC 2017
selfserv with PID 14882 started at Fri May 19 18:12:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2864: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14882 at Fri May 19 18:12:26 UTC 2017
kill -USR1 14882
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14882 killed at Fri May 19 18:12:26 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 18:12:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14939 >/dev/null 2>/dev/null
selfserv with PID 14939 found at Fri May 19 18:12:27 UTC 2017
selfserv with PID 14939 started at Fri May 19 18:12:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2865: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14939 at Fri May 19 18:12:29 UTC 2017
kill -USR1 14939
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14939 killed at Fri May 19 18:12:29 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Fri May 19 18:12:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15017 >/dev/null 2>/dev/null
selfserv with PID 15017 found at Fri May 19 18:12:29 UTC 2017
selfserv with PID 15017 started at Fri May 19 18:12:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2866: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15017 at Fri May 19 18:12:31 UTC 2017
kill -USR1 15017
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15017 killed at Fri May 19 18:12:31 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Fri May 19 18:12:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15080 >/dev/null 2>/dev/null
selfserv with PID 15080 found at Fri May 19 18:12:31 UTC 2017
selfserv with PID 15080 started at Fri May 19 18:12:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2867: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15080 at Fri May 19 18:12:32 UTC 2017
kill -USR1 15080
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15080 killed at Fri May 19 18:12:32 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Fri May 19 18:12:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15143 >/dev/null 2>/dev/null
selfserv with PID 15143 found at Fri May 19 18:12:33 UTC 2017
selfserv with PID 15143 started at Fri May 19 18:12:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2868: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15143 at Fri May 19 18:12:34 UTC 2017
kill -USR1 15143
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15143 killed at Fri May 19 18:12:34 UTC 2017
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Fri May 19 18:12:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15206 >/dev/null 2>/dev/null
selfserv with PID 15206 found at Fri May 19 18:12:34 UTC 2017
selfserv with PID 15206 started at Fri May 19 18:12:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2869: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15206 at Fri May 19 18:12:36 UTC 2017
kill -USR1 15206
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15206 killed at Fri May 19 18:12:36 UTC 2017
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Fri May 19 18:12:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15269 >/dev/null 2>/dev/null
selfserv with PID 15269 found at Fri May 19 18:12:36 UTC 2017
selfserv with PID 15269 started at Fri May 19 18:12:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -c v -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2870: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15269 at Fri May 19 18:12:37 UTC 2017
kill -USR1 15269
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15269 killed at Fri May 19 18:12:37 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Fri May 19 18:12:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15332 >/dev/null 2>/dev/null
selfserv with PID 15332 found at Fri May 19 18:12:37 UTC 2017
selfserv with PID 15332 started at Fri May 19 18:12:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2871: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15332 at Fri May 19 18:12:39 UTC 2017
kill -USR1 15332
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15332 killed at Fri May 19 18:12:39 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Fri May 19 18:12:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15395 >/dev/null 2>/dev/null
selfserv with PID 15395 found at Fri May 19 18:12:39 UTC 2017
selfserv with PID 15395 started at Fri May 19 18:12:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2872: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15395 at Fri May 19 18:12:41 UTC 2017
kill -USR1 15395
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15395 killed at Fri May 19 18:12:41 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Fri May 19 18:12:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15458 >/dev/null 2>/dev/null
selfserv with PID 15458 found at Fri May 19 18:12:41 UTC 2017
selfserv with PID 15458 started at Fri May 19 18:12:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser -a testbuildd-sni.(none) -a testbuildd.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
ssl.sh: #2873: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15458 at Fri May 19 18:12:43 UTC 2017
kill -USR1 15458
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15458 killed at Fri May 19 18:12:43 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Fri May 19 18:12:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15521 >/dev/null 2>/dev/null
selfserv with PID 15521 found at Fri May 19 18:12:43 UTC 2017
selfserv with PID 15521 started at Fri May 19 18:12:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni.(none) -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #2874: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15521 at Fri May 19 18:12:44 UTC 2017
kill -USR1 15521
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15521 killed at Fri May 19 18:12:44 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Fri May 19 18:12:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15584 >/dev/null 2>/dev/null
selfserv with PID 15584 found at Fri May 19 18:12:44 UTC 2017
selfserv with PID 15584 started at Fri May 19 18:12:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2875: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15584 at Fri May 19 18:12:46 UTC 2017
kill -USR1 15584
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15584 killed at Fri May 19 18:12:46 UTC 2017
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test  - server fips/client normal  - with ECC ===============================
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Fri May 19 18:12:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15694 >/dev/null 2>/dev/null
selfserv with PID 15694 found at Fri May 19 18:12:46 UTC 2017
selfserv with PID 15694 started at Fri May 19 18:12:46 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C c -V ssl3:ssl3 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:12:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:12:49 UTC 2017
ssl.sh: #2876: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 15694 at Fri May 19 18:12:49 UTC 2017
kill -USR1 15694
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15694 killed at Fri May 19 18:12:49 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Fri May 19 18:12:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15768 >/dev/null 2>/dev/null
selfserv with PID 15768 found at Fri May 19 18:12:49 UTC 2017
selfserv with PID 15768 started at Fri May 19 18:12:49 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C c \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:12:49 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:12:52 UTC 2017
ssl.sh: #2877: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 15768 at Fri May 19 18:12:52 UTC 2017
kill -USR1 15768
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15768 killed at Fri May 19 18:12:52 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Fri May 19 18:12:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15842 >/dev/null 2>/dev/null
selfserv with PID 15842 found at Fri May 19 18:12:52 UTC 2017
selfserv with PID 15842 started at Fri May 19 18:12:52 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 1000 -C c -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:12:52 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:12:55 UTC 2017
ssl.sh: #2878: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 15842 at Fri May 19 18:12:55 UTC 2017
kill -USR1 15842
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15842 killed at Fri May 19 18:12:55 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Fri May 19 18:12:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15916 >/dev/null 2>/dev/null
selfserv with PID 15916 found at Fri May 19 18:12:55 UTC 2017
selfserv with PID 15916 started at Fri May 19 18:12:55 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:12:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 18:12:58 UTC 2017
ssl.sh: #2879: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 15916 at Fri May 19 18:12:58 UTC 2017
kill -USR1 15916
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15916 killed at Fri May 19 18:12:58 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Fri May 19 18:12:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:12:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15990 >/dev/null 2>/dev/null
selfserv with PID 15990 found at Fri May 19 18:12:58 UTC 2017
selfserv with PID 15990 started at Fri May 19 18:12:58 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C c -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:12:58 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:13:02 UTC 2017
ssl.sh: #2880: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 15990 at Fri May 19 18:13:02 UTC 2017
kill -USR1 15990
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15990 killed at Fri May 19 18:13:02 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Fri May 19 18:13:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:13:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16064 >/dev/null 2>/dev/null
selfserv with PID 16064 found at Fri May 19 18:13:02 UTC 2017
selfserv with PID 16064 started at Fri May 19 18:13:02 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:13:02 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 18:13:05 UTC 2017
ssl.sh: #2881: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16064 at Fri May 19 18:13:05 UTC 2017
kill -USR1 16064
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16064 killed at Fri May 19 18:13:05 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Fri May 19 18:13:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:13:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16138 >/dev/null 2>/dev/null
selfserv with PID 16138 found at Fri May 19 18:13:05 UTC 2017
selfserv with PID 16138 started at Fri May 19 18:13:05 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:13:05 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 18:13:08 UTC 2017
ssl.sh: #2882: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16138 at Fri May 19 18:13:09 UTC 2017
kill -USR1 16138
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16138 killed at Fri May 19 18:13:09 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Fri May 19 18:13:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:13:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16218 >/dev/null 2>/dev/null
selfserv with PID 16218 found at Fri May 19 18:13:09 UTC 2017
selfserv with PID 16218 started at Fri May 19 18:13:09 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:13:09 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 18:13:12 UTC 2017
ssl.sh: #2883: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16218 at Fri May 19 18:13:12 UTC 2017
kill -USR1 16218
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16218 killed at Fri May 19 18:13:12 UTC 2017
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Fri May 19 18:13:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:13:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16307 >/dev/null 2>/dev/null
selfserv with PID 16307 found at Fri May 19 18:13:12 UTC 2017
selfserv with PID 16307 started at Fri May 19 18:13:12 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:13:12 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:13:17 UTC 2017
ssl.sh: #2884: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16307 at Fri May 19 18:13:17 UTC 2017
kill -USR1 16307
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16307 killed at Fri May 19 18:13:17 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Fri May 19 18:13:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:13:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16380 >/dev/null 2>/dev/null
selfserv with PID 16380 found at Fri May 19 18:13:18 UTC 2017
selfserv with PID 16380 started at Fri May 19 18:13:18 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C c -N -n TestUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:13:18 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:13:22 UTC 2017
ssl.sh: #2885: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16380 at Fri May 19 18:13:23 UTC 2017
kill -USR1 16380
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16380 killed at Fri May 19 18:13:23 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Fri May 19 18:13:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:13:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16453 >/dev/null 2>/dev/null
selfserv with PID 16453 found at Fri May 19 18:13:23 UTC 2017
selfserv with PID 16453 started at Fri May 19 18:13:23 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:13:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:13:24 UTC 2017
ssl.sh: #2886: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16453 at Fri May 19 18:13:24 UTC 2017
kill -USR1 16453
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16453 killed at Fri May 19 18:13:25 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Fri May 19 18:13:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:13:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16527 >/dev/null 2>/dev/null
selfserv with PID 16527 found at Fri May 19 18:13:25 UTC 2017
selfserv with PID 16527 started at Fri May 19 18:13:25 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:13:25 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:13:26 UTC 2017
ssl.sh: #2887: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16527 at Fri May 19 18:13:26 UTC 2017
kill -USR1 16527
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16527 killed at Fri May 19 18:13:26 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Fri May 19 18:13:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:13:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16601 >/dev/null 2>/dev/null
selfserv with PID 16601 found at Fri May 19 18:13:27 UTC 2017
selfserv with PID 16601 started at Fri May 19 18:13:27 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:13:27 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:13:28 UTC 2017
ssl.sh: #2888: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16601 at Fri May 19 18:13:28 UTC 2017
kill -USR1 16601
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16601 killed at Fri May 19 18:13:28 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Fri May 19 18:13:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:13:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16675 >/dev/null 2>/dev/null
selfserv with PID 16675 found at Fri May 19 18:13:28 UTC 2017
selfserv with PID 16675 started at Fri May 19 18:13:28 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:13:28 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:13:30 UTC 2017
ssl.sh: #2889: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16675 at Fri May 19 18:13:30 UTC 2017
kill -USR1 16675
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16675 killed at Fri May 19 18:13:30 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Fri May 19 18:13:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:13:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16749 >/dev/null 2>/dev/null
selfserv with PID 16749 found at Fri May 19 18:13:30 UTC 2017
selfserv with PID 16749 started at Fri May 19 18:13:30 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:13:30 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:13:32 UTC 2017
ssl.sh: #2890: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16749 at Fri May 19 18:13:32 UTC 2017
kill -USR1 16749
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16749 killed at Fri May 19 18:13:32 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Fri May 19 18:13:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:13:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16829 >/dev/null 2>/dev/null
selfserv with PID 16829 found at Fri May 19 18:13:32 UTC 2017
selfserv with PID 16829 started at Fri May 19 18:13:32 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:13:32 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 18:13:35 UTC 2017
ssl.sh: #2891: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16829 at Fri May 19 18:13:35 UTC 2017
kill -USR1 16829
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16829 killed at Fri May 19 18:13:36 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Fri May 19 18:13:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a testbuildd-sni.(none) -k testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:13:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16909 >/dev/null 2>/dev/null
selfserv with PID 16909 found at Fri May 19 18:13:36 UTC 2017
selfserv with PID 16909 started at Fri May 19 18:13:36 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0:tls1.2 -c 1000 -C c -u -a testbuildd-sni.(none) \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:13:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 18:13:39 UTC 2017
ssl.sh: #2892: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16909 at Fri May 19 18:13:39 UTC 2017
kill -USR1 16909
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16909 killed at Fri May 19 18:13:39 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Fri May 19 18:13:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:13:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16999 >/dev/null 2>/dev/null
selfserv with PID 16999 found at Fri May 19 18:13:39 UTC 2017
selfserv with PID 16999 started at Fri May 19 18:13:39 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:13:39 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:13:48 UTC 2017
ssl.sh: #2893: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 16999 at Fri May 19 18:13:48 UTC 2017
kill -USR1 16999
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16999 killed at Fri May 19 18:13:48 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ----
selfserv starting at Fri May 19 18:13:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C023 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:13:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17072 >/dev/null 2>/dev/null
selfserv with PID 17072 found at Fri May 19 18:13:48 UTC 2017
selfserv with PID 17072 started at Fri May 19 18:13:48 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:13:48 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:13:56 UTC 2017
ssl.sh: #2894: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17072 at Fri May 19 18:13:56 UTC 2017
kill -USR1 17072
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17072 killed at Fri May 19 18:13:56 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) ----
selfserv starting at Fri May 19 18:13:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02B -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:13:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17184 >/dev/null 2>/dev/null
selfserv with PID 17184 found at Fri May 19 18:13:57 UTC 2017
selfserv with PID 17184 started at Fri May 19 18:13:57 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:13:57 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:14:06 UTC 2017
ssl.sh: #2895: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17184 at Fri May 19 18:14:06 UTC 2017
kill -USR1 17184
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17184 killed at Fri May 19 18:14:06 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Fri May 19 18:14:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:14:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17525 >/dev/null 2>/dev/null
selfserv with PID 17525 found at Fri May 19 18:14:06 UTC 2017
selfserv with PID 17525 started at Fri May 19 18:14:06 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:14:06 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:14:16 UTC 2017
ssl.sh: #2896: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17525 at Fri May 19 18:14:16 UTC 2017
kill -USR1 17525
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17525 killed at Fri May 19 18:14:16 UTC 2017
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Fri May 19 18:14:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C00E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:14:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17620 >/dev/null 2>/dev/null
selfserv with PID 17620 found at Fri May 19 18:14:16 UTC 2017
selfserv with PID 17620 started at Fri May 19 18:14:16 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:14:16 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:14:23 UTC 2017
ssl.sh: #2897: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17620 at Fri May 19 18:14:23 UTC 2017
kill -USR1 17620
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17620 killed at Fri May 19 18:14:24 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Fri May 19 18:14:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:14:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17693 >/dev/null 2>/dev/null
selfserv with PID 17693 found at Fri May 19 18:14:24 UTC 2017
selfserv with PID 17693 started at Fri May 19 18:14:24 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:14:24 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:14:27 UTC 2017
ssl.sh: #2898: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17693 at Fri May 19 18:14:27 UTC 2017
kill -USR1 17693
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17693 killed at Fri May 19 18:14:27 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 ----
selfserv starting at Fri May 19 18:14:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C027 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:14:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17767 >/dev/null 2>/dev/null
selfserv with PID 17767 found at Fri May 19 18:14:27 UTC 2017
selfserv with PID 17767 started at Fri May 19 18:14:27 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:14:27 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:14:30 UTC 2017
ssl.sh: #2899: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17767 at Fri May 19 18:14:30 UTC 2017
kill -USR1 17767
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17767 killed at Fri May 19 18:14:30 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 GCM ----
selfserv starting at Fri May 19 18:14:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02F -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:14:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17841 >/dev/null 2>/dev/null
selfserv with PID 17841 found at Fri May 19 18:14:30 UTC 2017
selfserv with PID 17841 started at Fri May 19 18:14:30 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:14:30 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:14:33 UTC 2017
ssl.sh: #2900: Stress TLS  ECDHE-RSA   AES 128 GCM produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17841 at Fri May 19 18:14:33 UTC 2017
kill -USR1 17841
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17841 killed at Fri May 19 18:14:33 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Fri May 19 18:14:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:14:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17915 >/dev/null 2>/dev/null
selfserv with PID 17915 found at Fri May 19 18:14:33 UTC 2017
selfserv with PID 17915 started at Fri May 19 18:14:33 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:14:33 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 18:14:36 UTC 2017
ssl.sh: #2901: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17915 at Fri May 19 18:14:36 UTC 2017
kill -USR1 17915
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17915 killed at Fri May 19 18:14:37 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Fri May 19 18:14:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:14:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17989 >/dev/null 2>/dev/null
selfserv with PID 17989 found at Fri May 19 18:14:37 UTC 2017
selfserv with PID 17989 started at Fri May 19 18:14:37 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:14:37 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:14:38 UTC 2017
ssl.sh: #2902: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 17989 at Fri May 19 18:14:38 UTC 2017
kill -USR1 17989
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17989 killed at Fri May 19 18:14:38 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:14:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:14:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18078 >/dev/null 2>/dev/null
selfserv with PID 18078 found at Fri May 19 18:14:39 UTC 2017
selfserv with PID 18078 started at Fri May 19 18:14:39 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:14:39 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 18:14:42 UTC 2017
ssl.sh: #2903: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18078 at Fri May 19 18:14:42 UTC 2017
kill -USR1 18078
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18078 killed at Fri May 19 18:14:42 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Fri May 19 18:14:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:14:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18151 >/dev/null 2>/dev/null
selfserv with PID 18151 found at Fri May 19 18:14:42 UTC 2017
selfserv with PID 18151 started at Fri May 19 18:14:42 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:14:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:14:43 UTC 2017
ssl.sh: #2904: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18151 at Fri May 19 18:14:44 UTC 2017
kill -USR1 18151
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18151 killed at Fri May 19 18:14:44 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:14:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:14:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18225 >/dev/null 2>/dev/null
selfserv with PID 18225 found at Fri May 19 18:14:44 UTC 2017
selfserv with PID 18225 started at Fri May 19 18:14:44 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:14:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 18:14:47 UTC 2017
ssl.sh: #2905: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18225 at Fri May 19 18:14:47 UTC 2017
kill -USR1 18225
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18225 killed at Fri May 19 18:14:47 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:14:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:14:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18298 >/dev/null 2>/dev/null
selfserv with PID 18298 found at Fri May 19 18:14:47 UTC 2017
selfserv with PID 18298 started at Fri May 19 18:14:47 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n TestUser-ecmixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:14:47 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 18:14:50 UTC 2017
ssl.sh: #2906: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18298 at Fri May 19 18:14:50 UTC 2017
kill -USR1 18298
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18298 killed at Fri May 19 18:14:50 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Fri May 19 18:14:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:14:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18371 >/dev/null 2>/dev/null
selfserv with PID 18371 found at Fri May 19 18:14:50 UTC 2017
selfserv with PID 18371 started at Fri May 19 18:14:50 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:14:50 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:14:52 UTC 2017
ssl.sh: #2907: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18371 at Fri May 19 18:14:52 UTC 2017
kill -USR1 18371
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18371 killed at Fri May 19 18:14:52 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Fri May 19 18:14:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:14:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18446 >/dev/null 2>/dev/null
selfserv with PID 18446 found at Fri May 19 18:14:52 UTC 2017
selfserv with PID 18446 started at Fri May 19 18:14:52 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:14:52 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:14:54 UTC 2017
ssl.sh: #2908: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18446 at Fri May 19 18:14:54 UTC 2017
kill -USR1 18446
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18446 killed at Fri May 19 18:14:54 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ----
selfserv starting at Fri May 19 18:14:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0016 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:14:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18535 >/dev/null 2>/dev/null
selfserv with PID 18535 found at Fri May 19 18:14:54 UTC 2017
selfserv with PID 18535 started at Fri May 19 18:14:54 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:14:54 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 4 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:15:00 UTC 2017
ssl.sh: #2909: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18535 at Fri May 19 18:15:00 UTC 2017
kill -USR1 18535
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18535 killed at Fri May 19 18:15:00 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ----
selfserv starting at Fri May 19 18:15:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0033 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:15:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18608 >/dev/null 2>/dev/null
selfserv with PID 18608 found at Fri May 19 18:15:00 UTC 2017
selfserv with PID 18608 started at Fri May 19 18:15:00 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:15:00 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:15:04 UTC 2017
ssl.sh: #2910: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18608 at Fri May 19 18:15:04 UTC 2017
kill -USR1 18608
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18608 killed at Fri May 19 18:15:04 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Fri May 19 18:15:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0039 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:15:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18700 >/dev/null 2>/dev/null
selfserv with PID 18700 found at Fri May 19 18:15:04 UTC 2017
selfserv with PID 18700 started at Fri May 19 18:15:04 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:15:04 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:15:10 UTC 2017
ssl.sh: #2911: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18700 at Fri May 19 18:15:10 UTC 2017
kill -USR1 18700
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18700 killed at Fri May 19 18:15:10 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ----
selfserv starting at Fri May 19 18:15:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0040 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:15:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18773 >/dev/null 2>/dev/null
selfserv with PID 18773 found at Fri May 19 18:15:11 UTC 2017
selfserv with PID 18773 started at Fri May 19 18:15:11 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:15:11 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:15:18 UTC 2017
ssl.sh: #2912: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18773 at Fri May 19 18:15:18 UTC 2017
kill -USR1 18773
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18773 killed at Fri May 19 18:15:18 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Fri May 19 18:15:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0038 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:15:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18856 >/dev/null 2>/dev/null
selfserv with PID 18856 found at Fri May 19 18:15:18 UTC 2017
selfserv with PID 18856 started at Fri May 19 18:15:18 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:15:19 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 18:16:22 UTC 2017
ssl.sh: #2913: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18856 at Fri May 19 18:16:22 UTC 2017
kill -USR1 18856
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18856 killed at Fri May 19 18:16:22 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ----
selfserv starting at Fri May 19 18:16:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006A -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:16:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18939 >/dev/null 2>/dev/null
selfserv with PID 18939 found at Fri May 19 18:16:22 UTC 2017
selfserv with PID 18939 started at Fri May 19 18:16:22 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:16:22 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 18:17:26 UTC 2017
ssl.sh: #2914: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 18939 at Fri May 19 18:17:26 UTC 2017
kill -USR1 18939
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18939 killed at Fri May 19 18:17:26 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ----
selfserv starting at Fri May 19 18:17:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006B -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:17:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19015 >/dev/null 2>/dev/null
selfserv with PID 19015 found at Fri May 19 18:17:26 UTC 2017
selfserv with PID 19015 started at Fri May 19 18:17:26 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:17:26 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:17:32 UTC 2017
ssl.sh: #2915: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19015 at Fri May 19 18:17:32 UTC 2017
kill -USR1 19015
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19015 killed at Fri May 19 18:17:32 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ----
selfserv starting at Fri May 19 18:17:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:17:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19089 >/dev/null 2>/dev/null
selfserv with PID 19089 found at Fri May 19 18:17:33 UTC 2017
selfserv with PID 19089 started at Fri May 19 18:17:33 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:17:33 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:17:39 UTC 2017
ssl.sh: #2916: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19089 at Fri May 19 18:17:39 UTC 2017
kill -USR1 19089
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19089 killed at Fri May 19 18:17:39 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ----
selfserv starting at Fri May 19 18:17:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009F -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:17:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19162 >/dev/null 2>/dev/null
selfserv with PID 19162 found at Fri May 19 18:17:39 UTC 2017
selfserv with PID 19162 started at Fri May 19 18:17:39 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:17:39 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 7 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:17:45 UTC 2017
ssl.sh: #2917: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19162 at Fri May 19 18:17:46 UTC 2017
kill -USR1 19162
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19162 killed at Fri May 19 18:17:46 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:17:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:17:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19250 >/dev/null 2>/dev/null
selfserv with PID 19250 found at Fri May 19 18:17:46 UTC 2017
selfserv with PID 19250 started at Fri May 19 18:17:46 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:17:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:17:56 UTC 2017
ssl.sh: #2918: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19250 at Fri May 19 18:17:57 UTC 2017
kill -USR1 19250
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19250 killed at Fri May 19 18:17:57 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Fri May 19 18:17:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:17:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19323 >/dev/null 2>/dev/null
selfserv with PID 19323 found at Fri May 19 18:17:57 UTC 2017
selfserv with PID 19323 started at Fri May 19 18:17:57 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n TestUser-dsamixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:17:57 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:18:00 UTC 2017
ssl.sh: #2919: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19323 at Fri May 19 18:18:00 UTC 2017
kill -USR1 19323
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19323 killed at Fri May 19 18:18:00 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Fri May 19 18:18:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:18:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19413 >/dev/null 2>/dev/null
selfserv with PID 19413 found at Fri May 19 18:18:00 UTC 2017
selfserv with PID 19413 started at Fri May 19 18:18:00 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:18:00 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 18:19:36 UTC 2017
ssl.sh: #2920: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19413 at Fri May 19 18:19:36 UTC 2017
kill -USR1 19413
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19413 killed at Fri May 19 18:19:36 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Fri May 19 18:19:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:19:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19815 >/dev/null 2>/dev/null
selfserv with PID 19815 found at Fri May 19 18:19:36 UTC 2017
selfserv with PID 19815 started at Fri May 19 18:19:36 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:19:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 18:21:15 UTC 2017
ssl.sh: #2921: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 19815 at Fri May 19 18:21:15 UTC 2017
kill -USR1 19815
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19815 killed at Fri May 19 18:21:15 UTC 2017
ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal  - with ECC ===============================
selfserv starting at Fri May 19 18:21:15 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:21:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:15 UTC 2017
selfserv with PID 19919 started at Fri May 19 18:21:15 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2922: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2923: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2924: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2925: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2926: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2927: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2928: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2929: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2930: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2931: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2932: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2933: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2934: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2935: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2936: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2937: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2938: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2939: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2940: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2941: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2942: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2943: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2944: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2945: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2946: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2947: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2948: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2949: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2950: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2951: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2952: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2953: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2954: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2955: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2956: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2957: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2958: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2959: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2960: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  l    TLS12_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  m    TLS12_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2961: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2962: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2963: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2964: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2965: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2966: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2967: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2968: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2969: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2970: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2971: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2972: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2973: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2974: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2975: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2976: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2977: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2978: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2979: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2980: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2981: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2982: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2983: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2984: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2985: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2986: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2987: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2988: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2989: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19919 >/dev/null 2>/dev/null
selfserv with PID 19919 found at Fri May 19 18:21:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2990: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 19919 at Fri May 19 18:21:39 UTC 2017
kill -USR1 19919
selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19919 killed at Fri May 19 18:21:39 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:21:39 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:21:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21553 >/dev/null 2>/dev/null
selfserv with PID 21553 found at Fri May 19 18:21:39 UTC 2017
selfserv with PID 21553 started at Fri May 19 18:21:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2991: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21553 >/dev/null 2>/dev/null
selfserv with PID 21553 found at Fri May 19 18:21:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2992: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21553 >/dev/null 2>/dev/null
selfserv with PID 21553 found at Fri May 19 18:21:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2993: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21553 >/dev/null 2>/dev/null
selfserv with PID 21553 found at Fri May 19 18:21:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2994: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21553 >/dev/null 2>/dev/null
selfserv with PID 21553 found at Fri May 19 18:21:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2995: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 21553 at Fri May 19 18:21:41 UTC 2017
kill -USR1 21553
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21553 killed at Fri May 19 18:21:41 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:21:42 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:21:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21691 >/dev/null 2>/dev/null
selfserv with PID 21691 found at Fri May 19 18:21:42 UTC 2017
selfserv with PID 21691 started at Fri May 19 18:21:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2996: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21691 >/dev/null 2>/dev/null
selfserv with PID 21691 found at Fri May 19 18:21:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2997: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21691 >/dev/null 2>/dev/null
selfserv with PID 21691 found at Fri May 19 18:21:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2998: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21691 >/dev/null 2>/dev/null
selfserv with PID 21691 found at Fri May 19 18:21:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2999: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21691 >/dev/null 2>/dev/null
selfserv with PID 21691 found at Fri May 19 18:21:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3000: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 21691 >/dev/null 2>/dev/null
selfserv with PID 21691 found at Fri May 19 18:21:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3001: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 21691 >/dev/null 2>/dev/null
selfserv with PID 21691 found at Fri May 19 18:21:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3002: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21691 >/dev/null 2>/dev/null
selfserv with PID 21691 found at Fri May 19 18:21:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3003: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21691 >/dev/null 2>/dev/null
selfserv with PID 21691 found at Fri May 19 18:21:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3004: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21691 >/dev/null 2>/dev/null
selfserv with PID 21691 found at Fri May 19 18:21:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3005: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 21691 >/dev/null 2>/dev/null
selfserv with PID 21691 found at Fri May 19 18:21:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3006: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 21691 >/dev/null 2>/dev/null
selfserv with PID 21691 found at Fri May 19 18:21:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3007: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21691 >/dev/null 2>/dev/null
selfserv with PID 21691 found at Fri May 19 18:21:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3008: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21691 >/dev/null 2>/dev/null
selfserv with PID 21691 found at Fri May 19 18:21:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3009: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21691 >/dev/null 2>/dev/null
selfserv with PID 21691 found at Fri May 19 18:21:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3010: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 21691 at Fri May 19 18:21:49 UTC 2017
kill -USR1 21691
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21691 killed at Fri May 19 18:21:49 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:21:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:21:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22045 >/dev/null 2>/dev/null
selfserv with PID 22045 found at Fri May 19 18:21:49 UTC 2017
selfserv with PID 22045 started at Fri May 19 18:21:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3011: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22045 >/dev/null 2>/dev/null
selfserv with PID 22045 found at Fri May 19 18:21:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3012: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22045 >/dev/null 2>/dev/null
selfserv with PID 22045 found at Fri May 19 18:21:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3013: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22045 >/dev/null 2>/dev/null
selfserv with PID 22045 found at Fri May 19 18:21:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3014: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22045 >/dev/null 2>/dev/null
selfserv with PID 22045 found at Fri May 19 18:21:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3015: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22045 at Fri May 19 18:21:51 UTC 2017
kill -USR1 22045
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22045 killed at Fri May 19 18:21:51 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:21:51 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:21:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22183 >/dev/null 2>/dev/null
selfserv with PID 22183 found at Fri May 19 18:21:52 UTC 2017
selfserv with PID 22183 started at Fri May 19 18:21:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3016: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22183 >/dev/null 2>/dev/null
selfserv with PID 22183 found at Fri May 19 18:21:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3017: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22183 >/dev/null 2>/dev/null
selfserv with PID 22183 found at Fri May 19 18:21:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3018: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22183 >/dev/null 2>/dev/null
selfserv with PID 22183 found at Fri May 19 18:21:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3019: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22183 >/dev/null 2>/dev/null
selfserv with PID 22183 found at Fri May 19 18:21:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3020: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22183 >/dev/null 2>/dev/null
selfserv with PID 22183 found at Fri May 19 18:21:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3021: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22183 >/dev/null 2>/dev/null
selfserv with PID 22183 found at Fri May 19 18:21:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3022: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22183 >/dev/null 2>/dev/null
selfserv with PID 22183 found at Fri May 19 18:21:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3023: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22183 >/dev/null 2>/dev/null
selfserv with PID 22183 found at Fri May 19 18:21:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3024: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22183 >/dev/null 2>/dev/null
selfserv with PID 22183 found at Fri May 19 18:21:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3025: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22183 >/dev/null 2>/dev/null
selfserv with PID 22183 found at Fri May 19 18:21:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3026: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22183 >/dev/null 2>/dev/null
selfserv with PID 22183 found at Fri May 19 18:21:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3027: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22183 >/dev/null 2>/dev/null
selfserv with PID 22183 found at Fri May 19 18:21:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3028: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22183 >/dev/null 2>/dev/null
selfserv with PID 22183 found at Fri May 19 18:21:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3029: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22183 >/dev/null 2>/dev/null
selfserv with PID 22183 found at Fri May 19 18:21:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3030: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22183 at Fri May 19 18:21:59 UTC 2017
kill -USR1 22183
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22183 killed at Fri May 19 18:21:59 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:21:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:21:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22537 >/dev/null 2>/dev/null
selfserv with PID 22537 found at Fri May 19 18:21:59 UTC 2017
selfserv with PID 22537 started at Fri May 19 18:21:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3031: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22537 >/dev/null 2>/dev/null
selfserv with PID 22537 found at Fri May 19 18:22:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3032: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22537 >/dev/null 2>/dev/null
selfserv with PID 22537 found at Fri May 19 18:22:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3033: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22537 >/dev/null 2>/dev/null
selfserv with PID 22537 found at Fri May 19 18:22:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3034: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22537 >/dev/null 2>/dev/null
selfserv with PID 22537 found at Fri May 19 18:22:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3035: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22537 at Fri May 19 18:22:01 UTC 2017
kill -USR1 22537
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22537 killed at Fri May 19 18:22:01 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:22:01 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22675 >/dev/null 2>/dev/null
selfserv with PID 22675 found at Fri May 19 18:22:01 UTC 2017
selfserv with PID 22675 started at Fri May 19 18:22:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3036: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22675 >/dev/null 2>/dev/null
selfserv with PID 22675 found at Fri May 19 18:22:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3037: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22675 >/dev/null 2>/dev/null
selfserv with PID 22675 found at Fri May 19 18:22:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3038: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22675 >/dev/null 2>/dev/null
selfserv with PID 22675 found at Fri May 19 18:22:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3039: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22675 >/dev/null 2>/dev/null
selfserv with PID 22675 found at Fri May 19 18:22:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3040: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 22675 >/dev/null 2>/dev/null
selfserv with PID 22675 found at Fri May 19 18:22:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3041: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 22675 >/dev/null 2>/dev/null
selfserv with PID 22675 found at Fri May 19 18:22:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3042: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 22675 >/dev/null 2>/dev/null
selfserv with PID 22675 found at Fri May 19 18:22:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3043: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 22675 >/dev/null 2>/dev/null
selfserv with PID 22675 found at Fri May 19 18:22:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3044: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 22675 >/dev/null 2>/dev/null
selfserv with PID 22675 found at Fri May 19 18:22:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3045: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 22675 >/dev/null 2>/dev/null
selfserv with PID 22675 found at Fri May 19 18:22:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3046: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 22675 >/dev/null 2>/dev/null
selfserv with PID 22675 found at Fri May 19 18:22:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3047: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 22675 >/dev/null 2>/dev/null
selfserv with PID 22675 found at Fri May 19 18:22:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3048: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 22675 >/dev/null 2>/dev/null
selfserv with PID 22675 found at Fri May 19 18:22:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3049: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 22675 >/dev/null 2>/dev/null
selfserv with PID 22675 found at Fri May 19 18:22:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3050: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22675 at Fri May 19 18:22:08 UTC 2017
kill -USR1 22675
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22675 killed at Fri May 19 18:22:08 UTC 2017
ssl.sh: SSL Client Authentication Extended Test - server fips/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 18:22:08 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23076 >/dev/null 2>/dev/null
selfserv with PID 23076 found at Fri May 19 18:22:08 UTC 2017
selfserv with PID 23076 started at Fri May 19 18:22:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3051: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23076 at Fri May 19 18:22:10 UTC 2017
kill -USR1 23076
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23076 killed at Fri May 19 18:22:10 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Fri May 19 18:22:10 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23133 >/dev/null 2>/dev/null
selfserv with PID 23133 found at Fri May 19 18:22:10 UTC 2017
selfserv with PID 23133 started at Fri May 19 18:22:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3052: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23133 at Fri May 19 18:22:11 UTC 2017
kill -USR1 23133
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23133 killed at Fri May 19 18:22:11 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Fri May 19 18:22:12 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23190 >/dev/null 2>/dev/null
selfserv with PID 23190 found at Fri May 19 18:22:12 UTC 2017
selfserv with PID 23190 started at Fri May 19 18:22:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3053: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23190 at Fri May 19 18:22:13 UTC 2017
kill -USR1 23190
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23190 killed at Fri May 19 18:22:13 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 18:22:14 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23247 >/dev/null 2>/dev/null
selfserv with PID 23247 found at Fri May 19 18:22:14 UTC 2017
selfserv with PID 23247 started at Fri May 19 18:22:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3054: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23247 at Fri May 19 18:22:15 UTC 2017
kill -USR1 23247
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23247 killed at Fri May 19 18:22:15 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Fri May 19 18:22:15 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23304 >/dev/null 2>/dev/null
selfserv with PID 23304 found at Fri May 19 18:22:15 UTC 2017
selfserv with PID 23304 started at Fri May 19 18:22:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3055: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23304 at Fri May 19 18:22:17 UTC 2017
kill -USR1 23304
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23304 killed at Fri May 19 18:22:17 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Fri May 19 18:22:17 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23361 >/dev/null 2>/dev/null
selfserv with PID 23361 found at Fri May 19 18:22:17 UTC 2017
selfserv with PID 23361 started at Fri May 19 18:22:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3056: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23361 at Fri May 19 18:22:19 UTC 2017
kill -USR1 23361
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23361 killed at Fri May 19 18:22:19 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 18:22:19 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23418 >/dev/null 2>/dev/null
selfserv with PID 23418 found at Fri May 19 18:22:19 UTC 2017
selfserv with PID 23418 started at Fri May 19 18:22:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3057: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23418 at Fri May 19 18:22:20 UTC 2017
kill -USR1 23418
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23418 killed at Fri May 19 18:22:21 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Fri May 19 18:22:21 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23475 >/dev/null 2>/dev/null
selfserv with PID 23475 found at Fri May 19 18:22:21 UTC 2017
selfserv with PID 23475 started at Fri May 19 18:22:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3058: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23475 at Fri May 19 18:22:22 UTC 2017
kill -USR1 23475
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23475 killed at Fri May 19 18:22:22 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Fri May 19 18:22:22 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23532 >/dev/null 2>/dev/null
selfserv with PID 23532 found at Fri May 19 18:22:22 UTC 2017
selfserv with PID 23532 started at Fri May 19 18:22:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3059: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23532 at Fri May 19 18:22:24 UTC 2017
kill -USR1 23532
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23532 killed at Fri May 19 18:22:24 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 18:22:24 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23589 >/dev/null 2>/dev/null
selfserv with PID 23589 found at Fri May 19 18:22:24 UTC 2017
selfserv with PID 23589 started at Fri May 19 18:22:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3060: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23589 at Fri May 19 18:22:26 UTC 2017
kill -USR1 23589
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23589 killed at Fri May 19 18:22:26 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Fri May 19 18:22:26 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23646 >/dev/null 2>/dev/null
selfserv with PID 23646 found at Fri May 19 18:22:26 UTC 2017
selfserv with PID 23646 started at Fri May 19 18:22:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3061: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23646 at Fri May 19 18:22:27 UTC 2017
kill -USR1 23646
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23646 killed at Fri May 19 18:22:27 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Fri May 19 18:22:27 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23703 >/dev/null 2>/dev/null
selfserv with PID 23703 found at Fri May 19 18:22:27 UTC 2017
selfserv with PID 23703 started at Fri May 19 18:22:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3062: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23703 at Fri May 19 18:22:29 UTC 2017
kill -USR1 23703
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23703 killed at Fri May 19 18:22:29 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 18:22:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23760 >/dev/null 2>/dev/null
selfserv with PID 23760 found at Fri May 19 18:22:29 UTC 2017
selfserv with PID 23760 started at Fri May 19 18:22:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3063: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23760 at Fri May 19 18:22:31 UTC 2017
kill -USR1 23760
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23760 killed at Fri May 19 18:22:31 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 18:22:31 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23817 >/dev/null 2>/dev/null
selfserv with PID 23817 found at Fri May 19 18:22:31 UTC 2017
selfserv with PID 23817 started at Fri May 19 18:22:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3064: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23817 at Fri May 19 18:22:33 UTC 2017
kill -USR1 23817
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23817 killed at Fri May 19 18:22:33 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 18:22:33 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23874 >/dev/null 2>/dev/null
selfserv with PID 23874 found at Fri May 19 18:22:33 UTC 2017
selfserv with PID 23874 started at Fri May 19 18:22:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3065: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23874 at Fri May 19 18:22:35 UTC 2017
kill -USR1 23874
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23874 killed at Fri May 19 18:22:35 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 18:22:35 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23931 >/dev/null 2>/dev/null
selfserv with PID 23931 found at Fri May 19 18:22:35 UTC 2017
selfserv with PID 23931 started at Fri May 19 18:22:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3066: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23931 at Fri May 19 18:22:37 UTC 2017
kill -USR1 23931
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23931 killed at Fri May 19 18:22:37 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 18:22:37 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23988 >/dev/null 2>/dev/null
selfserv with PID 23988 found at Fri May 19 18:22:37 UTC 2017
selfserv with PID 23988 started at Fri May 19 18:22:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3067: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23988 at Fri May 19 18:22:39 UTC 2017
kill -USR1 23988
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23988 killed at Fri May 19 18:22:39 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 18:22:39 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24045 >/dev/null 2>/dev/null
selfserv with PID 24045 found at Fri May 19 18:22:39 UTC 2017
selfserv with PID 24045 started at Fri May 19 18:22:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3068: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24045 at Fri May 19 18:22:41 UTC 2017
kill -USR1 24045
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24045 killed at Fri May 19 18:22:41 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 18:22:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24102 >/dev/null 2>/dev/null
selfserv with PID 24102 found at Fri May 19 18:22:41 UTC 2017
selfserv with PID 24102 started at Fri May 19 18:22:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3069: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24102 at Fri May 19 18:22:43 UTC 2017
kill -USR1 24102
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24102 killed at Fri May 19 18:22:43 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 18:22:43 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24159 >/dev/null 2>/dev/null
selfserv with PID 24159 found at Fri May 19 18:22:43 UTC 2017
selfserv with PID 24159 started at Fri May 19 18:22:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3070: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24159 at Fri May 19 18:22:45 UTC 2017
kill -USR1 24159
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24159 killed at Fri May 19 18:22:45 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 18:22:45 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24216 >/dev/null 2>/dev/null
selfserv with PID 24216 found at Fri May 19 18:22:46 UTC 2017
selfserv with PID 24216 started at Fri May 19 18:22:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3071: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24216 at Fri May 19 18:22:47 UTC 2017
kill -USR1 24216
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24216 killed at Fri May 19 18:22:47 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 18:22:48 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24273 >/dev/null 2>/dev/null
selfserv with PID 24273 found at Fri May 19 18:22:48 UTC 2017
selfserv with PID 24273 started at Fri May 19 18:22:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3072: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24273 at Fri May 19 18:22:49 UTC 2017
kill -USR1 24273
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24273 killed at Fri May 19 18:22:49 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 18:22:50 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24330 >/dev/null 2>/dev/null
selfserv with PID 24330 found at Fri May 19 18:22:50 UTC 2017
selfserv with PID 24330 started at Fri May 19 18:22:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3073: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24330 at Fri May 19 18:22:51 UTC 2017
kill -USR1 24330
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24330 killed at Fri May 19 18:22:51 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 18:22:52 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24388 >/dev/null 2>/dev/null
selfserv with PID 24388 found at Fri May 19 18:22:52 UTC 2017
selfserv with PID 24388 started at Fri May 19 18:22:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3074: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24388 at Fri May 19 18:22:54 UTC 2017
kill -USR1 24388
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24388 killed at Fri May 19 18:22:54 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 18:22:54 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24445 >/dev/null 2>/dev/null
selfserv with PID 24445 found at Fri May 19 18:22:54 UTC 2017
selfserv with PID 24445 started at Fri May 19 18:22:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3075: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24445 at Fri May 19 18:22:55 UTC 2017
kill -USR1 24445
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24445 killed at Fri May 19 18:22:55 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 18:22:56 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24502 >/dev/null 2>/dev/null
selfserv with PID 24502 found at Fri May 19 18:22:56 UTC 2017
selfserv with PID 24502 started at Fri May 19 18:22:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3076: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24502 at Fri May 19 18:22:57 UTC 2017
kill -USR1 24502
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24502 killed at Fri May 19 18:22:57 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 18:22:57 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24559 >/dev/null 2>/dev/null
selfserv with PID 24559 found at Fri May 19 18:22:57 UTC 2017
selfserv with PID 24559 started at Fri May 19 18:22:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3077: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24559 at Fri May 19 18:22:59 UTC 2017
kill -USR1 24559
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24559 killed at Fri May 19 18:22:59 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 18:22:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:22:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24616 >/dev/null 2>/dev/null
selfserv with PID 24616 found at Fri May 19 18:22:59 UTC 2017
selfserv with PID 24616 started at Fri May 19 18:22:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3078: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24616 at Fri May 19 18:23:01 UTC 2017
kill -USR1 24616
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24616 killed at Fri May 19 18:23:01 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 18:23:01 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24677 >/dev/null 2>/dev/null
selfserv with PID 24677 found at Fri May 19 18:23:01 UTC 2017
selfserv with PID 24677 started at Fri May 19 18:23:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3079: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24677 at Fri May 19 18:23:03 UTC 2017
kill -USR1 24677
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24677 killed at Fri May 19 18:23:03 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 18:23:03 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Fri May 19 18:23:03 UTC 2017
selfserv with PID 24746 started at Fri May 19 18:23:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3080: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24746 at Fri May 19 18:23:05 UTC 2017
kill -USR1 24746
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24746 killed at Fri May 19 18:23:05 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 18:23:05 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24818 >/dev/null 2>/dev/null
selfserv with PID 24818 found at Fri May 19 18:23:05 UTC 2017
selfserv with PID 24818 started at Fri May 19 18:23:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3081: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24818 at Fri May 19 18:23:07 UTC 2017
kill -USR1 24818
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24818 killed at Fri May 19 18:23:07 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 18:23:07 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24875 >/dev/null 2>/dev/null
selfserv with PID 24875 found at Fri May 19 18:23:07 UTC 2017
selfserv with PID 24875 started at Fri May 19 18:23:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3082: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24875 at Fri May 19 18:23:09 UTC 2017
kill -USR1 24875
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24875 killed at Fri May 19 18:23:09 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 18:23:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24932 >/dev/null 2>/dev/null
selfserv with PID 24932 found at Fri May 19 18:23:09 UTC 2017
selfserv with PID 24932 started at Fri May 19 18:23:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3083: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24932 at Fri May 19 18:23:10 UTC 2017
kill -USR1 24932
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24932 killed at Fri May 19 18:23:11 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 18:23:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24989 >/dev/null 2>/dev/null
selfserv with PID 24989 found at Fri May 19 18:23:11 UTC 2017
selfserv with PID 24989 started at Fri May 19 18:23:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3084: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24989 at Fri May 19 18:23:13 UTC 2017
kill -USR1 24989
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24989 killed at Fri May 19 18:23:13 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 18:23:13 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25046 >/dev/null 2>/dev/null
selfserv with PID 25046 found at Fri May 19 18:23:13 UTC 2017
selfserv with PID 25046 started at Fri May 19 18:23:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3085: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25046 at Fri May 19 18:23:14 UTC 2017
kill -USR1 25046
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25046 killed at Fri May 19 18:23:14 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 18:23:14 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25103 >/dev/null 2>/dev/null
selfserv with PID 25103 found at Fri May 19 18:23:14 UTC 2017
selfserv with PID 25103 started at Fri May 19 18:23:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3086: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25103 at Fri May 19 18:23:16 UTC 2017
kill -USR1 25103
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25103 killed at Fri May 19 18:23:16 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 18:23:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25160 >/dev/null 2>/dev/null
selfserv with PID 25160 found at Fri May 19 18:23:16 UTC 2017
selfserv with PID 25160 started at Fri May 19 18:23:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3087: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25160 at Fri May 19 18:23:18 UTC 2017
kill -USR1 25160
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25160 killed at Fri May 19 18:23:18 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 18:23:18 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25217 >/dev/null 2>/dev/null
selfserv with PID 25217 found at Fri May 19 18:23:18 UTC 2017
selfserv with PID 25217 started at Fri May 19 18:23:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3088: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25217 at Fri May 19 18:23:20 UTC 2017
kill -USR1 25217
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25217 killed at Fri May 19 18:23:20 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 18:23:20 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25274 >/dev/null 2>/dev/null
selfserv with PID 25274 found at Fri May 19 18:23:20 UTC 2017
selfserv with PID 25274 started at Fri May 19 18:23:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3089: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25274 at Fri May 19 18:23:22 UTC 2017
kill -USR1 25274
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25274 killed at Fri May 19 18:23:22 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 18:23:22 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25331 >/dev/null 2>/dev/null
selfserv with PID 25331 found at Fri May 19 18:23:22 UTC 2017
selfserv with PID 25331 started at Fri May 19 18:23:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3090: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25331 at Fri May 19 18:23:24 UTC 2017
kill -USR1 25331
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25331 killed at Fri May 19 18:23:24 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 18:23:24 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25388 >/dev/null 2>/dev/null
selfserv with PID 25388 found at Fri May 19 18:23:24 UTC 2017
selfserv with PID 25388 started at Fri May 19 18:23:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3091: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25388 at Fri May 19 18:23:26 UTC 2017
kill -USR1 25388
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25388 killed at Fri May 19 18:23:26 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 18:23:26 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25445 >/dev/null 2>/dev/null
selfserv with PID 25445 found at Fri May 19 18:23:26 UTC 2017
selfserv with PID 25445 started at Fri May 19 18:23:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3092: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25445 at Fri May 19 18:23:28 UTC 2017
kill -USR1 25445
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25445 killed at Fri May 19 18:23:28 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 18:23:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25502 >/dev/null 2>/dev/null
selfserv with PID 25502 found at Fri May 19 18:23:29 UTC 2017
selfserv with PID 25502 started at Fri May 19 18:23:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3093: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25502 at Fri May 19 18:23:30 UTC 2017
kill -USR1 25502
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25502 killed at Fri May 19 18:23:31 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 18:23:31 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25559 >/dev/null 2>/dev/null
selfserv with PID 25559 found at Fri May 19 18:23:31 UTC 2017
selfserv with PID 25559 started at Fri May 19 18:23:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3094: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25559 at Fri May 19 18:23:33 UTC 2017
kill -USR1 25559
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25559 killed at Fri May 19 18:23:33 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 18:23:33 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25616 >/dev/null 2>/dev/null
selfserv with PID 25616 found at Fri May 19 18:23:33 UTC 2017
selfserv with PID 25616 started at Fri May 19 18:23:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3095: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25616 at Fri May 19 18:23:35 UTC 2017
kill -USR1 25616
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25616 killed at Fri May 19 18:23:35 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 18:23:35 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25673 >/dev/null 2>/dev/null
selfserv with PID 25673 found at Fri May 19 18:23:35 UTC 2017
selfserv with PID 25673 started at Fri May 19 18:23:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3096: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25673 at Fri May 19 18:23:37 UTC 2017
kill -USR1 25673
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25673 killed at Fri May 19 18:23:37 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 18:23:37 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25730 >/dev/null 2>/dev/null
selfserv with PID 25730 found at Fri May 19 18:23:37 UTC 2017
selfserv with PID 25730 started at Fri May 19 18:23:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3097: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25730 at Fri May 19 18:23:39 UTC 2017
kill -USR1 25730
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25730 killed at Fri May 19 18:23:39 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 18:23:39 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25787 >/dev/null 2>/dev/null
selfserv with PID 25787 found at Fri May 19 18:23:39 UTC 2017
selfserv with PID 25787 started at Fri May 19 18:23:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3098: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25787 at Fri May 19 18:23:41 UTC 2017
kill -USR1 25787
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25787 killed at Fri May 19 18:23:41 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 18:23:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25844 >/dev/null 2>/dev/null
selfserv with PID 25844 found at Fri May 19 18:23:41 UTC 2017
selfserv with PID 25844 started at Fri May 19 18:23:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3099: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25844 at Fri May 19 18:23:43 UTC 2017
kill -USR1 25844
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25844 killed at Fri May 19 18:23:43 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 18:23:43 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25901 >/dev/null 2>/dev/null
selfserv with PID 25901 found at Fri May 19 18:23:43 UTC 2017
selfserv with PID 25901 started at Fri May 19 18:23:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3100: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25901 at Fri May 19 18:23:45 UTC 2017
kill -USR1 25901
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25901 killed at Fri May 19 18:23:45 UTC 2017
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test Extended Test - server fips/client normal  - with ECC ===============================
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Fri May 19 18:23:46 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26046 >/dev/null 2>/dev/null
selfserv with PID 26046 found at Fri May 19 18:23:46 UTC 2017
selfserv with PID 26046 started at Fri May 19 18:23:46 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 1000 -C c -V ssl3:ssl3 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:23:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:23:49 UTC 2017
ssl.sh: #3101: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26046 at Fri May 19 18:23:49 UTC 2017
kill -USR1 26046
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26046 killed at Fri May 19 18:23:49 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Fri May 19 18:23:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26120 >/dev/null 2>/dev/null
selfserv with PID 26120 found at Fri May 19 18:23:49 UTC 2017
selfserv with PID 26120 started at Fri May 19 18:23:49 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 1000 -C c \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:23:49 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:23:52 UTC 2017
ssl.sh: #3102: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26120 at Fri May 19 18:23:52 UTC 2017
kill -USR1 26120
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26120 killed at Fri May 19 18:23:52 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Fri May 19 18:23:52 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss   -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26194 >/dev/null 2>/dev/null
selfserv with PID 26194 found at Fri May 19 18:23:52 UTC 2017
selfserv with PID 26194 started at Fri May 19 18:23:52 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 1000 -C c -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:23:52 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:23:55 UTC 2017
ssl.sh: #3103: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26194 at Fri May 19 18:23:55 UTC 2017
kill -USR1 26194
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26194 killed at Fri May 19 18:23:55 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Fri May 19 18:23:55 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26293 >/dev/null 2>/dev/null
selfserv with PID 26293 found at Fri May 19 18:23:55 UTC 2017
selfserv with PID 26293 started at Fri May 19 18:23:55 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:23:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 18:23:58 UTC 2017
ssl.sh: #3104: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26293 at Fri May 19 18:23:58 UTC 2017
kill -USR1 26293
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26293 killed at Fri May 19 18:23:58 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Fri May 19 18:23:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:23:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26404 >/dev/null 2>/dev/null
selfserv with PID 26404 found at Fri May 19 18:23:59 UTC 2017
selfserv with PID 26404 started at Fri May 19 18:23:59 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C c -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:23:59 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:24:02 UTC 2017
ssl.sh: #3105: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26404 at Fri May 19 18:24:02 UTC 2017
kill -USR1 26404
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26404 killed at Fri May 19 18:24:02 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Fri May 19 18:24:02 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:24:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26583 >/dev/null 2>/dev/null
selfserv with PID 26583 found at Fri May 19 18:24:02 UTC 2017
selfserv with PID 26583 started at Fri May 19 18:24:02 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:24:02 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 18:24:06 UTC 2017
ssl.sh: #3106: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26583 at Fri May 19 18:24:06 UTC 2017
kill -USR1 26583
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26583 killed at Fri May 19 18:24:06 UTC 2017
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Fri May 19 18:24:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:24:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26767 >/dev/null 2>/dev/null
selfserv with PID 26767 found at Fri May 19 18:24:06 UTC 2017
selfserv with PID 26767 started at Fri May 19 18:24:06 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:24:06 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 18:24:10 UTC 2017
ssl.sh: #3107: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26767 at Fri May 19 18:24:10 UTC 2017
kill -USR1 26767
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26767 killed at Fri May 19 18:24:10 UTC 2017
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Fri May 19 18:24:10 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:24:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26910 >/dev/null 2>/dev/null
selfserv with PID 26910 found at Fri May 19 18:24:10 UTC 2017
selfserv with PID 26910 started at Fri May 19 18:24:10 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:24:10 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:24:16 UTC 2017
ssl.sh: #3108: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26910 at Fri May 19 18:24:16 UTC 2017
kill -USR1 26910
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26910 killed at Fri May 19 18:24:16 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Fri May 19 18:24:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:24:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26983 >/dev/null 2>/dev/null
selfserv with PID 26983 found at Fri May 19 18:24:16 UTC 2017
selfserv with PID 26983 started at Fri May 19 18:24:16 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 100 -C c -N -n ExtendedSSLUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:24:16 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:24:22 UTC 2017
ssl.sh: #3109: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26983 at Fri May 19 18:24:22 UTC 2017
kill -USR1 26983
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26983 killed at Fri May 19 18:24:22 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Fri May 19 18:24:22 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:24:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27056 >/dev/null 2>/dev/null
selfserv with PID 27056 found at Fri May 19 18:24:22 UTC 2017
selfserv with PID 27056 started at Fri May 19 18:24:22 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:24:22 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:24:24 UTC 2017
ssl.sh: #3110: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27056 at Fri May 19 18:24:24 UTC 2017
kill -USR1 27056
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27056 killed at Fri May 19 18:24:24 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Fri May 19 18:24:24 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:24:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27130 >/dev/null 2>/dev/null
selfserv with PID 27130 found at Fri May 19 18:24:24 UTC 2017
selfserv with PID 27130 started at Fri May 19 18:24:24 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:24:24 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:24:26 UTC 2017
ssl.sh: #3111: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27130 at Fri May 19 18:24:26 UTC 2017
kill -USR1 27130
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27130 killed at Fri May 19 18:24:26 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Fri May 19 18:24:26 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:24:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27204 >/dev/null 2>/dev/null
selfserv with PID 27204 found at Fri May 19 18:24:26 UTC 2017
selfserv with PID 27204 started at Fri May 19 18:24:26 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:24:26 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:24:28 UTC 2017
ssl.sh: #3112: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27204 at Fri May 19 18:24:28 UTC 2017
kill -USR1 27204
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27204 killed at Fri May 19 18:24:28 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Fri May 19 18:24:28 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:24:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27278 >/dev/null 2>/dev/null
selfserv with PID 27278 found at Fri May 19 18:24:28 UTC 2017
selfserv with PID 27278 started at Fri May 19 18:24:28 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:24:28 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:24:30 UTC 2017
ssl.sh: #3113: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27278 at Fri May 19 18:24:30 UTC 2017
kill -USR1 27278
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27278 killed at Fri May 19 18:24:30 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Fri May 19 18:24:30 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:24:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27352 >/dev/null 2>/dev/null
selfserv with PID 27352 found at Fri May 19 18:24:30 UTC 2017
selfserv with PID 27352 started at Fri May 19 18:24:30 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:24:30 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:24:32 UTC 2017
ssl.sh: #3114: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27352 at Fri May 19 18:24:32 UTC 2017
kill -USR1 27352
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27352 killed at Fri May 19 18:24:32 UTC 2017
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Fri May 19 18:24:32 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:24:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27445 >/dev/null 2>/dev/null
selfserv with PID 27445 found at Fri May 19 18:24:32 UTC 2017
selfserv with PID 27445 started at Fri May 19 18:24:32 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:24:32 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:24:44 UTC 2017
ssl.sh: #3115: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27445 at Fri May 19 18:24:44 UTC 2017
kill -USR1 27445
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27445 killed at Fri May 19 18:24:44 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ----
selfserv starting at Fri May 19 18:24:44 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C023 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:24:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27518 >/dev/null 2>/dev/null
selfserv with PID 27518 found at Fri May 19 18:24:44 UTC 2017
selfserv with PID 27518 started at Fri May 19 18:24:44 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:24:45 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:24:56 UTC 2017
ssl.sh: #3116: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27518 at Fri May 19 18:24:57 UTC 2017
kill -USR1 27518
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27518 killed at Fri May 19 18:24:57 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) ----
selfserv starting at Fri May 19 18:24:57 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02B -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:24:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27591 >/dev/null 2>/dev/null
selfserv with PID 27591 found at Fri May 19 18:24:57 UTC 2017
selfserv with PID 27591 started at Fri May 19 18:24:57 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:24:57 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:25:09 UTC 2017
ssl.sh: #3117: Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27591 at Fri May 19 18:25:09 UTC 2017
kill -USR1 27591
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27591 killed at Fri May 19 18:25:09 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Fri May 19 18:25:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:25:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27682 >/dev/null 2>/dev/null
selfserv with PID 27682 found at Fri May 19 18:25:09 UTC 2017
selfserv with PID 27682 started at Fri May 19 18:25:09 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:25:09 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:25:21 UTC 2017
ssl.sh: #3118: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27682 at Fri May 19 18:25:21 UTC 2017
kill -USR1 27682
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27682 killed at Fri May 19 18:25:21 UTC 2017
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Fri May 19 18:25:21 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C00E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:25:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27755 >/dev/null 2>/dev/null
selfserv with PID 27755 found at Fri May 19 18:25:21 UTC 2017
selfserv with PID 27755 started at Fri May 19 18:25:21 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:25:21 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:25:24 UTC 2017
ssl.sh: #3119: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27755 at Fri May 19 18:25:24 UTC 2017
kill -USR1 27755
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27755 killed at Fri May 19 18:25:24 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Fri May 19 18:25:24 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:25:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27828 >/dev/null 2>/dev/null
selfserv with PID 27828 found at Fri May 19 18:25:24 UTC 2017
selfserv with PID 27828 started at Fri May 19 18:25:24 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:25:24 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:25:27 UTC 2017
ssl.sh: #3120: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27828 at Fri May 19 18:25:27 UTC 2017
kill -USR1 27828
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27828 killed at Fri May 19 18:25:27 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 ----
selfserv starting at Fri May 19 18:25:27 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C027 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:25:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27902 >/dev/null 2>/dev/null
selfserv with PID 27902 found at Fri May 19 18:25:27 UTC 2017
selfserv with PID 27902 started at Fri May 19 18:25:27 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:25:27 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:25:30 UTC 2017
ssl.sh: #3121: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27902 at Fri May 19 18:25:30 UTC 2017
kill -USR1 27902
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27902 killed at Fri May 19 18:25:30 UTC 2017
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 GCM ----
selfserv starting at Fri May 19 18:25:31 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02F -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:25:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27976 >/dev/null 2>/dev/null
selfserv with PID 27976 found at Fri May 19 18:25:31 UTC 2017
selfserv with PID 27976 started at Fri May 19 18:25:31 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:25:31 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:25:33 UTC 2017
ssl.sh: #3122: Stress TLS  ECDHE-RSA   AES 128 GCM produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27976 at Fri May 19 18:25:33 UTC 2017
kill -USR1 27976
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27976 killed at Fri May 19 18:25:33 UTC 2017
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Fri May 19 18:25:34 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:25:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28050 >/dev/null 2>/dev/null
selfserv with PID 28050 found at Fri May 19 18:25:34 UTC 2017
selfserv with PID 28050 started at Fri May 19 18:25:34 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:25:34 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 18:25:37 UTC 2017
ssl.sh: #3123: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28050 at Fri May 19 18:25:37 UTC 2017
kill -USR1 28050
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28050 killed at Fri May 19 18:25:37 UTC 2017
ssl.sh: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Fri May 19 18:25:37 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:25:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28124 >/dev/null 2>/dev/null
selfserv with PID 28124 found at Fri May 19 18:25:37 UTC 2017
selfserv with PID 28124 started at Fri May 19 18:25:37 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:25:37 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:25:39 UTC 2017
ssl.sh: #3124: Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28124 at Fri May 19 18:25:39 UTC 2017
kill -USR1 28124
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28124 killed at Fri May 19 18:25:39 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:25:39 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:25:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28215 >/dev/null 2>/dev/null
selfserv with PID 28215 found at Fri May 19 18:25:39 UTC 2017
selfserv with PID 28215 started at Fri May 19 18:25:39 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:25:40 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 18:25:43 UTC 2017
ssl.sh: #3125: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28215 at Fri May 19 18:25:43 UTC 2017
kill -USR1 28215
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28215 killed at Fri May 19 18:25:43 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Fri May 19 18:25:43 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:25:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28288 >/dev/null 2>/dev/null
selfserv with PID 28288 found at Fri May 19 18:25:43 UTC 2017
selfserv with PID 28288 started at Fri May 19 18:25:43 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:25:43 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:25:45 UTC 2017
ssl.sh: #3126: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28288 at Fri May 19 18:25:45 UTC 2017
kill -USR1 28288
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28288 killed at Fri May 19 18:25:45 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:25:46 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:25:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28362 >/dev/null 2>/dev/null
selfserv with PID 28362 found at Fri May 19 18:25:46 UTC 2017
selfserv with PID 28362 started at Fri May 19 18:25:46 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:25:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 18:25:49 UTC 2017
ssl.sh: #3127: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28362 at Fri May 19 18:25:49 UTC 2017
kill -USR1 28362
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28362 killed at Fri May 19 18:25:49 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:25:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:25:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28435 >/dev/null 2>/dev/null
selfserv with PID 28435 found at Fri May 19 18:25:49 UTC 2017
selfserv with PID 28435 started at Fri May 19 18:25:49 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:25:49 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 18:25:51 UTC 2017
ssl.sh: #3128: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28435 at Fri May 19 18:25:51 UTC 2017
kill -USR1 28435
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28435 killed at Fri May 19 18:25:51 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Fri May 19 18:25:51 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:25:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28508 >/dev/null 2>/dev/null
selfserv with PID 28508 found at Fri May 19 18:25:51 UTC 2017
selfserv with PID 28508 started at Fri May 19 18:25:51 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:25:51 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:25:53 UTC 2017
ssl.sh: #3129: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28508 at Fri May 19 18:25:53 UTC 2017
kill -USR1 28508
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28508 killed at Fri May 19 18:25:53 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Fri May 19 18:25:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:25:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28582 >/dev/null 2>/dev/null
selfserv with PID 28582 found at Fri May 19 18:25:53 UTC 2017
selfserv with PID 28582 started at Fri May 19 18:25:53 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:25:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:25:55 UTC 2017
ssl.sh: #3130: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28582 at Fri May 19 18:25:55 UTC 2017
kill -USR1 28582
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28582 killed at Fri May 19 18:25:55 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ----
selfserv starting at Fri May 19 18:25:56 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0016 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:25:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28671 >/dev/null 2>/dev/null
selfserv with PID 28671 found at Fri May 19 18:25:56 UTC 2017
selfserv with PID 28671 started at Fri May 19 18:25:56 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:25:56 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:26:02 UTC 2017
ssl.sh: #3131: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28671 at Fri May 19 18:26:02 UTC 2017
kill -USR1 28671
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28671 killed at Fri May 19 18:26:02 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ----
selfserv starting at Fri May 19 18:26:02 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0033 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:26:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28744 >/dev/null 2>/dev/null
selfserv with PID 28744 found at Fri May 19 18:26:02 UTC 2017
selfserv with PID 28744 started at Fri May 19 18:26:02 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:26:02 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:26:05 UTC 2017
ssl.sh: #3132: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28744 at Fri May 19 18:26:05 UTC 2017
kill -USR1 28744
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28744 killed at Fri May 19 18:26:05 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Fri May 19 18:26:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0039 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:26:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28818 >/dev/null 2>/dev/null
selfserv with PID 28818 found at Fri May 19 18:26:06 UTC 2017
selfserv with PID 28818 started at Fri May 19 18:26:06 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:26:06 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:26:12 UTC 2017
ssl.sh: #3133: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28818 at Fri May 19 18:26:12 UTC 2017
kill -USR1 28818
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28818 killed at Fri May 19 18:26:12 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ----
selfserv starting at Fri May 19 18:26:12 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0040 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:26:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28891 >/dev/null 2>/dev/null
selfserv with PID 28891 found at Fri May 19 18:26:12 UTC 2017
selfserv with PID 28891 started at Fri May 19 18:26:13 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:26:13 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:26:23 UTC 2017
ssl.sh: #3134: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28891 at Fri May 19 18:26:23 UTC 2017
kill -USR1 28891
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28891 killed at Fri May 19 18:26:23 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Fri May 19 18:26:23 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0038 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:26:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28974 >/dev/null 2>/dev/null
selfserv with PID 28974 found at Fri May 19 18:26:23 UTC 2017
selfserv with PID 28974 started at Fri May 19 18:26:23 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:26:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 18:27:51 UTC 2017
ssl.sh: #3135: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28974 at Fri May 19 18:27:51 UTC 2017
kill -USR1 28974
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28974 killed at Fri May 19 18:27:51 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ----
selfserv starting at Fri May 19 18:27:52 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006A -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:27:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Fri May 19 18:27:52 UTC 2017
selfserv with PID 29059 started at Fri May 19 18:27:52 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:27:52 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 18:29:22 UTC 2017
ssl.sh: #3136: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29059 at Fri May 19 18:29:22 UTC 2017
kill -USR1 29059
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29059 killed at Fri May 19 18:29:22 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ----
selfserv starting at Fri May 19 18:29:22 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006B -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:29:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29463 >/dev/null 2>/dev/null
selfserv with PID 29463 found at Fri May 19 18:29:22 UTC 2017
selfserv with PID 29463 started at Fri May 19 18:29:22 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:29:22 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:29:28 UTC 2017
ssl.sh: #3137: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29463 at Fri May 19 18:29:28 UTC 2017
kill -USR1 29463
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29463 killed at Fri May 19 18:29:28 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ----
selfserv starting at Fri May 19 18:29:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:29:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29536 >/dev/null 2>/dev/null
selfserv with PID 29536 found at Fri May 19 18:29:29 UTC 2017
selfserv with PID 29536 started at Fri May 19 18:29:29 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:29:29 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:29:35 UTC 2017
ssl.sh: #3138: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29536 at Fri May 19 18:29:35 UTC 2017
kill -USR1 29536
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29536 killed at Fri May 19 18:29:35 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ----
selfserv starting at Fri May 19 18:29:35 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009F -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:29:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29610 >/dev/null 2>/dev/null
selfserv with PID 29610 found at Fri May 19 18:29:35 UTC 2017
selfserv with PID 29610 started at Fri May 19 18:29:35 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:29:35 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 7 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:29:42 UTC 2017
ssl.sh: #3139: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29610 at Fri May 19 18:29:42 UTC 2017
kill -USR1 29610
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29610 killed at Fri May 19 18:29:42 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:29:42 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:29:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29698 >/dev/null 2>/dev/null
selfserv with PID 29698 found at Fri May 19 18:29:43 UTC 2017
selfserv with PID 29698 started at Fri May 19 18:29:43 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:29:43 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:29:58 UTC 2017
ssl.sh: #3140: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29698 at Fri May 19 18:29:58 UTC 2017
kill -USR1 29698
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29698 killed at Fri May 19 18:29:59 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Fri May 19 18:29:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:29:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29773 >/dev/null 2>/dev/null
selfserv with PID 29773 found at Fri May 19 18:29:59 UTC 2017
selfserv with PID 29773 started at Fri May 19 18:29:59 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:29:59 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:30:02 UTC 2017
ssl.sh: #3141: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29773 at Fri May 19 18:30:02 UTC 2017
kill -USR1 29773
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29773 killed at Fri May 19 18:30:02 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Fri May 19 18:30:02 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:30:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29868 >/dev/null 2>/dev/null
selfserv with PID 29868 found at Fri May 19 18:30:03 UTC 2017
selfserv with PID 29868 started at Fri May 19 18:30:03 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:30:03 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 18:32:28 UTC 2017
ssl.sh: #3142: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29868 at Fri May 19 18:32:28 UTC 2017
kill -USR1 29868
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29868 killed at Fri May 19 18:32:28 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Fri May 19 18:32:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:32:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29954 >/dev/null 2>/dev/null
selfserv with PID 29954 found at Fri May 19 18:32:29 UTC 2017
selfserv with PID 29954 started at Fri May 19 18:32:29 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:32:29 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 18:34:58 UTC 2017
ssl.sh: #3143: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29954 at Fri May 19 18:34:58 UTC 2017
kill -USR1 29954
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29954 killed at Fri May 19 18:34:58 UTC 2017
ssl.sh: SSL - FIPS mode off for server ===============================
ssl.sh: Turning FIPS off for the  server
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -fips false -force
FIPS mode disabled.
ssl.sh: #3144:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/server -list
ssl.sh: #3145:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #3146:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: Turning FIPS off for the extended  server
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -fips false -force
FIPS mode disabled.
ssl.sh: #3147:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_server -list
ssl.sh: #3148:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #3149:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: SSL - FIPS mode on for client ===============================
ssl.sh: Turning FIPS on for the  client
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -fips true -force
FIPS mode enabled.
ssl.sh: #3150:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -list
ssl.sh: #3151:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #3152:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: Turning FIPS on for the extended  client
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -fips true -force
FIPS mode enabled.
ssl.sh: #3153:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -list
ssl.sh: #3154:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #3155:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: SSL Cipher Coverage  - server normal/client fips  - with ECC ===============================
selfserv starting at Fri May 19 18:35:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:35:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:03 UTC 2017
selfserv with PID 30513 started at Fri May 19 18:35:03 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3156: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3157: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3158: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3159: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3160: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3161: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3162: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3163: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3164: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3165: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3166: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3167: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3168: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3169: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3170: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3171: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3172: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3173: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3174: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3175: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3176: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3177: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3178: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3179: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3180: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3181: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3182: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3183: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3184: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3185: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3186: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3187: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3188: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3189: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3190: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3191: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3192: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3193: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3194: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  l    TLS12_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  m    TLS12_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3195: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3196: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3197: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3198: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3199: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3200: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3201: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3202: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3203: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3204: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3205: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3206: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3207: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3208: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3209: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3210: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3211: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3212: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3213: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3214: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3215: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3216: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3217: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3218: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:35:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3219: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:36:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3220: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:36:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3221: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:36:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3222: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:36:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3223: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30513 >/dev/null 2>/dev/null
selfserv with PID 30513 found at Fri May 19 18:36:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3224: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30513 at Fri May 19 18:36:05 UTC 2017
kill -USR1 30513
selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30513 killed at Fri May 19 18:36:05 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:36:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:36:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32157 >/dev/null 2>/dev/null
selfserv with PID 32157 found at Fri May 19 18:36:05 UTC 2017
selfserv with PID 32157 started at Fri May 19 18:36:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3225: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32157 >/dev/null 2>/dev/null
selfserv with PID 32157 found at Fri May 19 18:36:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3226: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32157 >/dev/null 2>/dev/null
selfserv with PID 32157 found at Fri May 19 18:36:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3227: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32157 >/dev/null 2>/dev/null
selfserv with PID 32157 found at Fri May 19 18:36:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3228: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32157 >/dev/null 2>/dev/null
selfserv with PID 32157 found at Fri May 19 18:36:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3229: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32157 at Fri May 19 18:36:10 UTC 2017
kill -USR1 32157
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32157 killed at Fri May 19 18:36:10 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:36:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:36:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32295 >/dev/null 2>/dev/null
selfserv with PID 32295 found at Fri May 19 18:36:10 UTC 2017
selfserv with PID 32295 started at Fri May 19 18:36:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3230: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32295 >/dev/null 2>/dev/null
selfserv with PID 32295 found at Fri May 19 18:36:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3231: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32295 >/dev/null 2>/dev/null
selfserv with PID 32295 found at Fri May 19 18:36:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3232: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32295 >/dev/null 2>/dev/null
selfserv with PID 32295 found at Fri May 19 18:36:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3233: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32295 >/dev/null 2>/dev/null
selfserv with PID 32295 found at Fri May 19 18:36:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3234: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 32295 >/dev/null 2>/dev/null
selfserv with PID 32295 found at Fri May 19 18:36:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3235: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 32295 >/dev/null 2>/dev/null
selfserv with PID 32295 found at Fri May 19 18:36:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3236: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32295 >/dev/null 2>/dev/null
selfserv with PID 32295 found at Fri May 19 18:36:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3237: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32295 >/dev/null 2>/dev/null
selfserv with PID 32295 found at Fri May 19 18:36:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3238: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32295 >/dev/null 2>/dev/null
selfserv with PID 32295 found at Fri May 19 18:36:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3239: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 32295 >/dev/null 2>/dev/null
selfserv with PID 32295 found at Fri May 19 18:36:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3240: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 32295 >/dev/null 2>/dev/null
selfserv with PID 32295 found at Fri May 19 18:36:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3241: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32295 >/dev/null 2>/dev/null
selfserv with PID 32295 found at Fri May 19 18:36:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3242: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32295 >/dev/null 2>/dev/null
selfserv with PID 32295 found at Fri May 19 18:36:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3243: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32295 >/dev/null 2>/dev/null
selfserv with PID 32295 found at Fri May 19 18:36:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3244: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32295 at Fri May 19 18:36:24 UTC 2017
kill -USR1 32295
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32295 killed at Fri May 19 18:36:24 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:36:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:36:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32648 >/dev/null 2>/dev/null
selfserv with PID 32648 found at Fri May 19 18:36:24 UTC 2017
selfserv with PID 32648 started at Fri May 19 18:36:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3245: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32648 >/dev/null 2>/dev/null
selfserv with PID 32648 found at Fri May 19 18:36:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3246: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32648 >/dev/null 2>/dev/null
selfserv with PID 32648 found at Fri May 19 18:36:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3247: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32648 >/dev/null 2>/dev/null
selfserv with PID 32648 found at Fri May 19 18:36:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3248: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32648 >/dev/null 2>/dev/null
selfserv with PID 32648 found at Fri May 19 18:36:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3249: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32648 at Fri May 19 18:36:29 UTC 2017
kill -USR1 32648
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32648 killed at Fri May 19 18:36:29 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:36:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:36:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 318 >/dev/null 2>/dev/null
selfserv with PID 318 found at Fri May 19 18:36:29 UTC 2017
selfserv with PID 318 started at Fri May 19 18:36:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3250: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 318 >/dev/null 2>/dev/null
selfserv with PID 318 found at Fri May 19 18:36:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3251: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 318 >/dev/null 2>/dev/null
selfserv with PID 318 found at Fri May 19 18:36:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3252: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 318 >/dev/null 2>/dev/null
selfserv with PID 318 found at Fri May 19 18:36:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3253: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 318 >/dev/null 2>/dev/null
selfserv with PID 318 found at Fri May 19 18:36:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3254: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 318 >/dev/null 2>/dev/null
selfserv with PID 318 found at Fri May 19 18:36:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3255: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 318 >/dev/null 2>/dev/null
selfserv with PID 318 found at Fri May 19 18:36:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3256: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 318 >/dev/null 2>/dev/null
selfserv with PID 318 found at Fri May 19 18:36:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3257: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 318 >/dev/null 2>/dev/null
selfserv with PID 318 found at Fri May 19 18:36:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3258: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 318 >/dev/null 2>/dev/null
selfserv with PID 318 found at Fri May 19 18:36:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3259: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 318 >/dev/null 2>/dev/null
selfserv with PID 318 found at Fri May 19 18:36:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3260: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 318 >/dev/null 2>/dev/null
selfserv with PID 318 found at Fri May 19 18:36:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3261: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 318 >/dev/null 2>/dev/null
selfserv with PID 318 found at Fri May 19 18:36:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3262: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 318 >/dev/null 2>/dev/null
selfserv with PID 318 found at Fri May 19 18:36:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3263: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 318 >/dev/null 2>/dev/null
selfserv with PID 318 found at Fri May 19 18:36:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3264: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 318 at Fri May 19 18:36:43 UTC 2017
kill -USR1 318
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 318 killed at Fri May 19 18:36:43 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:36:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:36:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 682 >/dev/null 2>/dev/null
selfserv with PID 682 found at Fri May 19 18:36:43 UTC 2017
selfserv with PID 682 started at Fri May 19 18:36:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3265: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 682 >/dev/null 2>/dev/null
selfserv with PID 682 found at Fri May 19 18:36:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3266: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 682 >/dev/null 2>/dev/null
selfserv with PID 682 found at Fri May 19 18:36:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3267: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 682 >/dev/null 2>/dev/null
selfserv with PID 682 found at Fri May 19 18:36:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3268: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 682 >/dev/null 2>/dev/null
selfserv with PID 682 found at Fri May 19 18:36:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3269: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 682 at Fri May 19 18:36:48 UTC 2017
kill -USR1 682
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 682 killed at Fri May 19 18:36:48 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:36:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:36:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 823 >/dev/null 2>/dev/null
selfserv with PID 823 found at Fri May 19 18:36:48 UTC 2017
selfserv with PID 823 started at Fri May 19 18:36:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3270: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 823 >/dev/null 2>/dev/null
selfserv with PID 823 found at Fri May 19 18:36:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3271: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 823 >/dev/null 2>/dev/null
selfserv with PID 823 found at Fri May 19 18:36:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3272: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 823 >/dev/null 2>/dev/null
selfserv with PID 823 found at Fri May 19 18:36:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3273: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 823 >/dev/null 2>/dev/null
selfserv with PID 823 found at Fri May 19 18:36:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3274: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 823 >/dev/null 2>/dev/null
selfserv with PID 823 found at Fri May 19 18:36:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3275: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 823 >/dev/null 2>/dev/null
selfserv with PID 823 found at Fri May 19 18:36:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3276: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 823 >/dev/null 2>/dev/null
selfserv with PID 823 found at Fri May 19 18:36:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3277: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 823 >/dev/null 2>/dev/null
selfserv with PID 823 found at Fri May 19 18:36:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3278: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 823 >/dev/null 2>/dev/null
selfserv with PID 823 found at Fri May 19 18:36:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3279: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 823 >/dev/null 2>/dev/null
selfserv with PID 823 found at Fri May 19 18:36:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3280: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 823 >/dev/null 2>/dev/null
selfserv with PID 823 found at Fri May 19 18:36:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3281: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 823 >/dev/null 2>/dev/null
selfserv with PID 823 found at Fri May 19 18:36:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3282: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 823 >/dev/null 2>/dev/null
selfserv with PID 823 found at Fri May 19 18:37:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3283: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 823 >/dev/null 2>/dev/null
selfserv with PID 823 found at Fri May 19 18:37:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2  \
        -f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3284: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 823 at Fri May 19 18:37:02 UTC 2017
kill -USR1 823
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 823 killed at Fri May 19 18:37:02 UTC 2017
ssl.sh: SSL Client Authentication  - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  TLS Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 18:37:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1232 >/dev/null 2>/dev/null
selfserv with PID 1232 found at Fri May 19 18:37:02 UTC 2017
selfserv with PID 1232 started at Fri May 19 18:37:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3285: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1232 at Fri May 19 18:37:03 UTC 2017
kill -USR1 1232
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1232 killed at Fri May 19 18:37:03 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Fri May 19 18:37:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1290 >/dev/null 2>/dev/null
selfserv with PID 1290 found at Fri May 19 18:37:03 UTC 2017
selfserv with PID 1290 started at Fri May 19 18:37:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3286: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1290 at Fri May 19 18:37:09 UTC 2017
kill -USR1 1290
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1290 killed at Fri May 19 18:37:09 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Fri May 19 18:37:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1347 >/dev/null 2>/dev/null
selfserv with PID 1347 found at Fri May 19 18:37:09 UTC 2017
selfserv with PID 1347 started at Fri May 19 18:37:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3287: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1347 at Fri May 19 18:37:11 UTC 2017
kill -USR1 1347
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1347 killed at Fri May 19 18:37:11 UTC 2017
ssl.sh: skipping  SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 18:37:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1410 >/dev/null 2>/dev/null
selfserv with PID 1410 found at Fri May 19 18:37:11 UTC 2017
selfserv with PID 1410 started at Fri May 19 18:37:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3288: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1410 at Fri May 19 18:37:12 UTC 2017
kill -USR1 1410
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1410 killed at Fri May 19 18:37:12 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Fri May 19 18:37:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1467 >/dev/null 2>/dev/null
selfserv with PID 1467 found at Fri May 19 18:37:12 UTC 2017
selfserv with PID 1467 started at Fri May 19 18:37:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12227:
SSL peer was unable to negotiate an acceptable set of security parameters.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation.
tstclnt: exiting with return code 254
ssl.sh: #3289: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1467 at Fri May 19 18:37:14 UTC 2017
kill -USR1 1467
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1467 killed at Fri May 19 18:37:14 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Fri May 19 18:37:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1524 >/dev/null 2>/dev/null
selfserv with PID 1524 found at Fri May 19 18:37:14 UTC 2017
selfserv with PID 1524 started at Fri May 19 18:37:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3290: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1524 at Fri May 19 18:37:15 UTC 2017
kill -USR1 1524
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1524 killed at Fri May 19 18:37:15 UTC 2017
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 18:37:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1587 >/dev/null 2>/dev/null
selfserv with PID 1587 found at Fri May 19 18:37:16 UTC 2017
selfserv with PID 1587 started at Fri May 19 18:37:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3291: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1587 at Fri May 19 18:37:17 UTC 2017
kill -USR1 1587
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1587 killed at Fri May 19 18:37:17 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 18:37:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1644 >/dev/null 2>/dev/null
selfserv with PID 1644 found at Fri May 19 18:37:17 UTC 2017
selfserv with PID 1644 started at Fri May 19 18:37:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3292: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1644 at Fri May 19 18:37:23 UTC 2017
kill -USR1 1644
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1644 killed at Fri May 19 18:37:23 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 18:37:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1701 >/dev/null 2>/dev/null
selfserv with PID 1701 found at Fri May 19 18:37:23 UTC 2017
selfserv with PID 1701 started at Fri May 19 18:37:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3293: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1701 at Fri May 19 18:37:24 UTC 2017
kill -USR1 1701
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1701 killed at Fri May 19 18:37:24 UTC 2017
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 18:37:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1764 >/dev/null 2>/dev/null
selfserv with PID 1764 found at Fri May 19 18:37:25 UTC 2017
selfserv with PID 1764 started at Fri May 19 18:37:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3294: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1764 at Fri May 19 18:37:26 UTC 2017
kill -USR1 1764
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1764 killed at Fri May 19 18:37:26 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 18:37:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1821 >/dev/null 2>/dev/null
selfserv with PID 1821 found at Fri May 19 18:37:26 UTC 2017
selfserv with PID 1821 started at Fri May 19 18:37:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3295: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1821 at Fri May 19 18:37:32 UTC 2017
kill -USR1 1821
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1821 killed at Fri May 19 18:37:32 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 18:37:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1878 >/dev/null 2>/dev/null
selfserv with PID 1878 found at Fri May 19 18:37:32 UTC 2017
selfserv with PID 1878 started at Fri May 19 18:37:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3296: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1878 at Fri May 19 18:37:34 UTC 2017
kill -USR1 1878
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1878 killed at Fri May 19 18:37:34 UTC 2017
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 18:37:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1941 >/dev/null 2>/dev/null
selfserv with PID 1941 found at Fri May 19 18:37:34 UTC 2017
selfserv with PID 1941 started at Fri May 19 18:37:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3297: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1941 at Fri May 19 18:37:35 UTC 2017
kill -USR1 1941
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1941 killed at Fri May 19 18:37:35 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 18:37:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1998 >/dev/null 2>/dev/null
selfserv with PID 1998 found at Fri May 19 18:37:35 UTC 2017
selfserv with PID 1998 started at Fri May 19 18:37:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12227:
SSL peer was unable to negotiate an acceptable set of security parameters.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation.
tstclnt: exiting with return code 254
ssl.sh: #3298: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1998 at Fri May 19 18:37:37 UTC 2017
kill -USR1 1998
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1998 killed at Fri May 19 18:37:37 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 18:37:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2076 >/dev/null 2>/dev/null
selfserv with PID 2076 found at Fri May 19 18:37:38 UTC 2017
selfserv with PID 2076 started at Fri May 19 18:37:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3299: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2076 at Fri May 19 18:37:39 UTC 2017
kill -USR1 2076
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2076 killed at Fri May 19 18:37:39 UTC 2017
ssl.sh: skipping  TLS Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 18:37:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2152 >/dev/null 2>/dev/null
selfserv with PID 2152 found at Fri May 19 18:37:39 UTC 2017
selfserv with PID 2152 started at Fri May 19 18:37:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3300: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2152 at Fri May 19 18:37:45 UTC 2017
kill -USR1 2152
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2152 killed at Fri May 19 18:37:45 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 18:37:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2209 >/dev/null 2>/dev/null
selfserv with PID 2209 found at Fri May 19 18:37:45 UTC 2017
selfserv with PID 2209 started at Fri May 19 18:37:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3301: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2209 at Fri May 19 18:37:46 UTC 2017
kill -USR1 2209
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2209 killed at Fri May 19 18:37:46 UTC 2017
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 18:37:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2270 >/dev/null 2>/dev/null
selfserv with PID 2270 found at Fri May 19 18:37:47 UTC 2017
selfserv with PID 2270 started at Fri May 19 18:37:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12227:
SSL peer was unable to negotiate an acceptable set of security parameters.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation.
tstclnt: exiting with return code 254
ssl.sh: #3302: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2270 at Fri May 19 18:37:49 UTC 2017
kill -USR1 2270
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2270 killed at Fri May 19 18:37:49 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 18:37:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2327 >/dev/null 2>/dev/null
selfserv with PID 2327 found at Fri May 19 18:37:49 UTC 2017
selfserv with PID 2327 started at Fri May 19 18:37:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3303: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2327 at Fri May 19 18:37:50 UTC 2017
kill -USR1 2327
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2327 killed at Fri May 19 18:37:50 UTC 2017
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 18:37:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2388 >/dev/null 2>/dev/null
selfserv with PID 2388 found at Fri May 19 18:37:50 UTC 2017
selfserv with PID 2388 started at Fri May 19 18:37:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3304: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2388 at Fri May 19 18:37:56 UTC 2017
kill -USR1 2388
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2388 killed at Fri May 19 18:37:56 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 18:37:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2445 >/dev/null 2>/dev/null
selfserv with PID 2445 found at Fri May 19 18:37:56 UTC 2017
selfserv with PID 2445 started at Fri May 19 18:37:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3305: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2445 at Fri May 19 18:37:58 UTC 2017
kill -USR1 2445
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2445 killed at Fri May 19 18:37:58 UTC 2017
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 18:37:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:37:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2506 >/dev/null 2>/dev/null
selfserv with PID 2506 found at Fri May 19 18:37:58 UTC 2017
selfserv with PID 2506 started at Fri May 19 18:37:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3306: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2506 at Fri May 19 18:38:04 UTC 2017
kill -USR1 2506
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2506 killed at Fri May 19 18:38:04 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 18:38:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2581 >/dev/null 2>/dev/null
selfserv with PID 2581 found at Fri May 19 18:38:04 UTC 2017
selfserv with PID 2581 started at Fri May 19 18:38:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3307: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2581 at Fri May 19 18:38:06 UTC 2017
kill -USR1 2581
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2581 killed at Fri May 19 18:38:06 UTC 2017
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 18:38:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2646 >/dev/null 2>/dev/null
selfserv with PID 2646 found at Fri May 19 18:38:06 UTC 2017
selfserv with PID 2646 started at Fri May 19 18:38:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12227:
SSL peer was unable to negotiate an acceptable set of security parameters.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation.
tstclnt: exiting with return code 254
ssl.sh: #3308: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2646 at Fri May 19 18:38:08 UTC 2017
kill -USR1 2646
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2646 killed at Fri May 19 18:38:08 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 18:38:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2704 >/dev/null 2>/dev/null
selfserv with PID 2704 found at Fri May 19 18:38:08 UTC 2017
selfserv with PID 2704 started at Fri May 19 18:38:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3309: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2704 at Fri May 19 18:38:10 UTC 2017
kill -USR1 2704
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2704 killed at Fri May 19 18:38:10 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Fri May 19 18:38:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2784 >/dev/null 2>/dev/null
selfserv with PID 2784 found at Fri May 19 18:38:10 UTC 2017
selfserv with PID 2784 started at Fri May 19 18:38:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3310: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2784 at Fri May 19 18:38:11 UTC 2017
kill -USR1 2784
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2784 killed at Fri May 19 18:38:11 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Fri May 19 18:38:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2848 >/dev/null 2>/dev/null
selfserv with PID 2848 found at Fri May 19 18:38:11 UTC 2017
selfserv with PID 2848 started at Fri May 19 18:38:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3311: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2848 at Fri May 19 18:38:12 UTC 2017
kill -USR1 2848
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2848 killed at Fri May 19 18:38:12 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Fri May 19 18:38:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2911 >/dev/null 2>/dev/null
selfserv with PID 2911 found at Fri May 19 18:38:13 UTC 2017
selfserv with PID 2911 started at Fri May 19 18:38:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #3312: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2911 at Fri May 19 18:38:13 UTC 2017
kill -USR1 2911
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2911 killed at Fri May 19 18:38:13 UTC 2017
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Fri May 19 18:38:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2974 >/dev/null 2>/dev/null
selfserv with PID 2974 found at Fri May 19 18:38:14 UTC 2017
selfserv with PID 2974 started at Fri May 19 18:38:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3313: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2974 at Fri May 19 18:38:15 UTC 2017
kill -USR1 2974
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2974 killed at Fri May 19 18:38:15 UTC 2017
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Fri May 19 18:38:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3037 >/dev/null 2>/dev/null
selfserv with PID 3037 found at Fri May 19 18:38:15 UTC 2017
selfserv with PID 3037 started at Fri May 19 18:38:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:ssl3 -c v -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #3314: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3037 at Fri May 19 18:38:16 UTC 2017
kill -USR1 3037
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3037 killed at Fri May 19 18:38:16 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Fri May 19 18:38:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3102 >/dev/null 2>/dev/null
selfserv with PID 3102 found at Fri May 19 18:38:16 UTC 2017
selfserv with PID 3102 started at Fri May 19 18:38:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3315: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3102 at Fri May 19 18:38:17 UTC 2017
kill -USR1 3102
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3102 killed at Fri May 19 18:38:17 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Fri May 19 18:38:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3166 >/dev/null 2>/dev/null
selfserv with PID 3166 found at Fri May 19 18:38:18 UTC 2017
selfserv with PID 3166 started at Fri May 19 18:38:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3316: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3166 at Fri May 19 18:38:19 UTC 2017
kill -USR1 3166
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3166 killed at Fri May 19 18:38:19 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Fri May 19 18:38:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3230 >/dev/null 2>/dev/null
selfserv with PID 3230 found at Fri May 19 18:38:19 UTC 2017
selfserv with PID 3230 started at Fri May 19 18:38:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -w nss -n TestUser -a testbuildd-sni.(none) -a testbuildd.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
ssl.sh: #3317: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3230 at Fri May 19 18:38:20 UTC 2017
kill -USR1 3230
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3230 killed at Fri May 19 18:38:20 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Fri May 19 18:38:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3293 >/dev/null 2>/dev/null
selfserv with PID 3293 found at Fri May 19 18:38:20 UTC 2017
selfserv with PID 3293 started at Fri May 19 18:38:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni.(none) -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=testbuildd-sni.(none),E=testbuildd-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #3318: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3293 at Fri May 19 18:38:21 UTC 2017
kill -USR1 3293
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3293 killed at Fri May 19 18:38:21 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Fri May 19 18:38:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3356 >/dev/null 2>/dev/null
selfserv with PID 3356 found at Fri May 19 18:38:21 UTC 2017
selfserv with PID 3356 started at Fri May 19 18:38:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v  \
        -V ssl3:tls1.2 -c v -w nss -n TestUser -a testbuildd-sni1.(none)  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #3319: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3356 at Fri May 19 18:38:22 UTC 2017
kill -USR1 3356
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3356 killed at Fri May 19 18:38:22 UTC 2017
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test  - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  Form is subject to the terms of the Mozilla Public (non-FIPS only)
ssl.sh: skipping  If a copy of the MPL was not distributed with this (non-FIPS only)
ssl.sh: skipping  obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  the stress tests for SSL/TLS. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  client                         Test Case name (non-FIPS only)
ssl.sh: skipping  params (non-FIPS only)
ssl.sh: skipping  ------                         --------------- (non-FIPS only)
ssl.sh: skipping  Stress SSL3 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Fri May 19 18:38:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3458 >/dev/null 2>/dev/null
selfserv with PID 3458 found at Fri May 19 18:38:23 UTC 2017
selfserv with PID 3458 started at Fri May 19 18:38:23 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:38:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:38:27 UTC 2017
ssl.sh: #3320: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3458 at Fri May 19 18:38:27 UTC 2017
kill -USR1 3458
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3458 killed at Fri May 19 18:38:27 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Fri May 19 18:38:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3531 >/dev/null 2>/dev/null
selfserv with PID 3531 found at Fri May 19 18:38:28 UTC 2017
selfserv with PID 3531 started at Fri May 19 18:38:28 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -c 100 -C c -N -n TestUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:38:28 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:38:32 UTC 2017
ssl.sh: #3321: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3531 at Fri May 19 18:38:32 UTC 2017
kill -USR1 3531
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3531 killed at Fri May 19 18:38:32 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Fri May 19 18:38:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3604 >/dev/null 2>/dev/null
selfserv with PID 3604 found at Fri May 19 18:38:32 UTC 2017
selfserv with PID 3604 started at Fri May 19 18:38:32 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:38:32 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:38:33 UTC 2017
ssl.sh: #3322: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3604 at Fri May 19 18:38:34 UTC 2017
kill -USR1 3604
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3604 killed at Fri May 19 18:38:34 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Fri May 19 18:38:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3678 >/dev/null 2>/dev/null
selfserv with PID 3678 found at Fri May 19 18:38:34 UTC 2017
selfserv with PID 3678 started at Fri May 19 18:38:34 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:38:34 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:38:35 UTC 2017
ssl.sh: #3323: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3678 at Fri May 19 18:38:35 UTC 2017
kill -USR1 3678
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3678 killed at Fri May 19 18:38:35 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Fri May 19 18:38:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3752 >/dev/null 2>/dev/null
selfserv with PID 3752 found at Fri May 19 18:38:35 UTC 2017
selfserv with PID 3752 started at Fri May 19 18:38:35 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:38:35 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:38:36 UTC 2017
ssl.sh: #3324: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3752 at Fri May 19 18:38:36 UTC 2017
kill -USR1 3752
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3752 killed at Fri May 19 18:38:36 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Fri May 19 18:38:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3826 >/dev/null 2>/dev/null
selfserv with PID 3826 found at Fri May 19 18:38:37 UTC 2017
selfserv with PID 3826 started at Fri May 19 18:38:37 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:38:37 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:38:38 UTC 2017
ssl.sh: #3325: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3826 at Fri May 19 18:38:38 UTC 2017
kill -USR1 3826
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3826 killed at Fri May 19 18:38:38 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Fri May 19 18:38:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3900 >/dev/null 2>/dev/null
selfserv with PID 3900 found at Fri May 19 18:38:38 UTC 2017
selfserv with PID 3900 started at Fri May 19 18:38:38 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:38:38 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:38:39 UTC 2017
ssl.sh: #3326: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3900 at Fri May 19 18:38:39 UTC 2017
kill -USR1 3900
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3900 killed at Fri May 19 18:38:39 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Fri May 19 18:38:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3980 >/dev/null 2>/dev/null
selfserv with PID 3980 found at Fri May 19 18:38:40 UTC 2017
selfserv with PID 3980 started at Fri May 19 18:38:40 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:38:40 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 18:38:42 UTC 2017
ssl.sh: #3327: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3980 at Fri May 19 18:38:42 UTC 2017
kill -USR1 3980
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3980 killed at Fri May 19 18:38:42 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Fri May 19 18:38:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a testbuildd-sni.(none) -k testbuildd-sni.(none) -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4060 >/dev/null 2>/dev/null
selfserv with PID 4060 found at Fri May 19 18:38:43 UTC 2017
selfserv with PID 4060 started at Fri May 19 18:38:43 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V tls1.0:tls1.2 -c 1000 -C c -u -a testbuildd-sni.(none) \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:38:43 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Fri May 19 18:38:45 UTC 2017
ssl.sh: #3328: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4060 at Fri May 19 18:38:46 UTC 2017
kill -USR1 4060
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4060 killed at Fri May 19 18:38:46 UTC 2017
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  ############################ (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 GCM (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:38:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4166 >/dev/null 2>/dev/null
selfserv with PID 4166 found at Fri May 19 18:38:46 UTC 2017
selfserv with PID 4166 started at Fri May 19 18:38:46 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:38:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 18:38:48 UTC 2017
ssl.sh: #3329: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4166 at Fri May 19 18:38:48 UTC 2017
kill -USR1 4166
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4166 killed at Fri May 19 18:38:48 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Fri May 19 18:38:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4239 >/dev/null 2>/dev/null
selfserv with PID 4239 found at Fri May 19 18:38:49 UTC 2017
selfserv with PID 4239 started at Fri May 19 18:38:49 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:38:49 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:38:50 UTC 2017
ssl.sh: #3330: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4239 at Fri May 19 18:38:50 UTC 2017
kill -USR1 4239
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4239 killed at Fri May 19 18:38:50 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:38:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4313 >/dev/null 2>/dev/null
selfserv with PID 4313 found at Fri May 19 18:38:50 UTC 2017
selfserv with PID 4313 started at Fri May 19 18:38:50 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:38:50 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 18:38:53 UTC 2017
ssl.sh: #3331: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4313 at Fri May 19 18:38:53 UTC 2017
kill -USR1 4313
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4313 killed at Fri May 19 18:38:53 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:38:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4386 >/dev/null 2>/dev/null
selfserv with PID 4386 found at Fri May 19 18:38:53 UTC 2017
selfserv with PID 4386 started at Fri May 19 18:38:53 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n TestUser-ecmixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:38:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 18:38:55 UTC 2017
ssl.sh: #3332: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4386 at Fri May 19 18:38:55 UTC 2017
kill -USR1 4386
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4386 killed at Fri May 19 18:38:55 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Fri May 19 18:38:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4485 >/dev/null 2>/dev/null
selfserv with PID 4485 found at Fri May 19 18:38:55 UTC 2017
selfserv with PID 4485 started at Fri May 19 18:38:55 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:38:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:38:57 UTC 2017
ssl.sh: #3333: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4485 at Fri May 19 18:38:57 UTC 2017
kill -USR1 4485
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4485 killed at Fri May 19 18:38:57 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Fri May 19 18:38:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4586 >/dev/null 2>/dev/null
selfserv with PID 4586 found at Fri May 19 18:38:57 UTC 2017
selfserv with PID 4586 started at Fri May 19 18:38:57 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:38:57 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:38:58 UTC 2017
ssl.sh: #3334: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4586 at Fri May 19 18:38:59 UTC 2017
kill -USR1 4586
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4586 killed at Fri May 19 18:38:59 UTC 2017
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  ############################ (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) (non-FIPS only)
ssl.sh: skipping  -V_ssl3:tls1.2_-c_1000_-C_:0038_-u Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (session ticket) (non-FIPS only)
ssl.sh: skipping  session ticket test, once session tickets with DHE_DSS are working (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  -V_ssl3:tls1.2_-c_1000_-C_:006A    Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (non-FIPS only)
ssl.sh: skipping  reuse test, once the session cache with DHE_DSS is working (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:38:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:38:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4729 >/dev/null 2>/dev/null
selfserv with PID 4729 found at Fri May 19 18:38:59 UTC 2017
selfserv with PID 4729 started at Fri May 19 18:38:59 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:38:59 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:39:11 UTC 2017
ssl.sh: #3335: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4729 at Fri May 19 18:39:11 UTC 2017
kill -USR1 4729
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4729 killed at Fri May 19 18:39:11 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Fri May 19 18:39:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:39:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5056 >/dev/null 2>/dev/null
selfserv with PID 5056 found at Fri May 19 18:39:11 UTC 2017
selfserv with PID 5056 started at Fri May 19 18:39:11 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n TestUser-dsamixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:39:11 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:39:14 UTC 2017
ssl.sh: #3336: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5056 at Fri May 19 18:39:14 UTC 2017
kill -USR1 5056
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5056 killed at Fri May 19 18:39:14 UTC 2017
ssl.sh: skipping  session ticket test, once session tickets with DHE_DSS are working (non-FIPS only)
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Fri May 19 18:39:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:39:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5142 >/dev/null 2>/dev/null
selfserv with PID 5142 found at Fri May 19 18:39:14 UTC 2017
selfserv with PID 5142 started at Fri May 19 18:39:14 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:39:14 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 18:40:50 UTC 2017
ssl.sh: #3337: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5142 at Fri May 19 18:40:50 UTC 2017
kill -USR1 5142
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5142 killed at Fri May 19 18:40:50 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Fri May 19 18:40:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:40:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5233 >/dev/null 2>/dev/null
selfserv with PID 5233 found at Fri May 19 18:40:50 UTC 2017
selfserv with PID 5233 started at Fri May 19 18:40:50 UTC 2017
strsclnt -q -p 8443 -d ../client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n TestUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:40:50 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 18:42:25 UTC 2017
ssl.sh: #3338: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5233 at Fri May 19 18:42:25 UTC 2017
kill -USR1 5233
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5233 killed at Fri May 19 18:42:25 UTC 2017
ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips  - with ECC ===============================
selfserv starting at Fri May 19 18:42:25 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:42:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:26 UTC 2017
selfserv with PID 5295 started at Fri May 19 18:42:26 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3339: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3340: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3341: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3342: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3343: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3344: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3345: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3346: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3347: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3348: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3349: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3350: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3351: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3352: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3353: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3354: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3355: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3356: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3357: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3358: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3359: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3360: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3361: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3362: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3363: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3364: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3365: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3366: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3367: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3368: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3369: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3370: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3371: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3372: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3373: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3374: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3375: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3376: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3377: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  l    TLS12_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  m    TLS12_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:42:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3378: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3379: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3380: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3381: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3382: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3383: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3384: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3385: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3386: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3387: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3388: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3389: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3390: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3391: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3392: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3393: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3394: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3395: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3396: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3397: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3398: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3399: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3400: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3401: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3402: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3403: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3404: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3405: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3406: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5295 >/dev/null 2>/dev/null
selfserv with PID 5295 found at Fri May 19 18:43:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3407: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 5295 at Fri May 19 18:43:28 UTC 2017
kill -USR1 5295
selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5295 killed at Fri May 19 18:43:28 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:43:28 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:43:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6997 >/dev/null 2>/dev/null
selfserv with PID 6997 found at Fri May 19 18:43:28 UTC 2017
selfserv with PID 6997 started at Fri May 19 18:43:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3408: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 6997 >/dev/null 2>/dev/null
selfserv with PID 6997 found at Fri May 19 18:43:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3409: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6997 >/dev/null 2>/dev/null
selfserv with PID 6997 found at Fri May 19 18:43:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3410: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6997 >/dev/null 2>/dev/null
selfserv with PID 6997 found at Fri May 19 18:43:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3411: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6997 >/dev/null 2>/dev/null
selfserv with PID 6997 found at Fri May 19 18:43:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3412: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 6997 at Fri May 19 18:43:32 UTC 2017
kill -USR1 6997
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6997 killed at Fri May 19 18:43:32 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:43:32 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:43:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7135 >/dev/null 2>/dev/null
selfserv with PID 7135 found at Fri May 19 18:43:32 UTC 2017
selfserv with PID 7135 started at Fri May 19 18:43:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3413: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 7135 >/dev/null 2>/dev/null
selfserv with PID 7135 found at Fri May 19 18:43:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3414: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7135 >/dev/null 2>/dev/null
selfserv with PID 7135 found at Fri May 19 18:43:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3415: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7135 >/dev/null 2>/dev/null
selfserv with PID 7135 found at Fri May 19 18:43:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3416: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7135 >/dev/null 2>/dev/null
selfserv with PID 7135 found at Fri May 19 18:43:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3417: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 7135 >/dev/null 2>/dev/null
selfserv with PID 7135 found at Fri May 19 18:43:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3418: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 7135 >/dev/null 2>/dev/null
selfserv with PID 7135 found at Fri May 19 18:43:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3419: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7135 >/dev/null 2>/dev/null
selfserv with PID 7135 found at Fri May 19 18:43:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3420: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7135 >/dev/null 2>/dev/null
selfserv with PID 7135 found at Fri May 19 18:43:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3421: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7135 >/dev/null 2>/dev/null
selfserv with PID 7135 found at Fri May 19 18:43:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3422: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 7135 >/dev/null 2>/dev/null
selfserv with PID 7135 found at Fri May 19 18:43:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3423: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 7135 >/dev/null 2>/dev/null
selfserv with PID 7135 found at Fri May 19 18:43:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3424: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7135 >/dev/null 2>/dev/null
selfserv with PID 7135 found at Fri May 19 18:43:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3425: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7135 >/dev/null 2>/dev/null
selfserv with PID 7135 found at Fri May 19 18:43:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3426: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7135 >/dev/null 2>/dev/null
selfserv with PID 7135 found at Fri May 19 18:43:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3427: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 7135 at Fri May 19 18:43:47 UTC 2017
kill -USR1 7135
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7135 killed at Fri May 19 18:43:47 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:43:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:43:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7488 >/dev/null 2>/dev/null
selfserv with PID 7488 found at Fri May 19 18:43:47 UTC 2017
selfserv with PID 7488 started at Fri May 19 18:43:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3428: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 7488 >/dev/null 2>/dev/null
selfserv with PID 7488 found at Fri May 19 18:43:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3429: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7488 >/dev/null 2>/dev/null
selfserv with PID 7488 found at Fri May 19 18:43:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3430: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7488 >/dev/null 2>/dev/null
selfserv with PID 7488 found at Fri May 19 18:43:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3431: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7488 >/dev/null 2>/dev/null
selfserv with PID 7488 found at Fri May 19 18:43:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3432: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 7488 at Fri May 19 18:43:51 UTC 2017
kill -USR1 7488
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7488 killed at Fri May 19 18:43:51 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:43:51 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:43:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7626 >/dev/null 2>/dev/null
selfserv with PID 7626 found at Fri May 19 18:43:51 UTC 2017
selfserv with PID 7626 started at Fri May 19 18:43:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3433: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 7626 >/dev/null 2>/dev/null
selfserv with PID 7626 found at Fri May 19 18:43:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3434: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7626 >/dev/null 2>/dev/null
selfserv with PID 7626 found at Fri May 19 18:43:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3435: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7626 >/dev/null 2>/dev/null
selfserv with PID 7626 found at Fri May 19 18:43:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3436: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7626 >/dev/null 2>/dev/null
selfserv with PID 7626 found at Fri May 19 18:43:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3437: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 7626 >/dev/null 2>/dev/null
selfserv with PID 7626 found at Fri May 19 18:43:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3438: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 7626 >/dev/null 2>/dev/null
selfserv with PID 7626 found at Fri May 19 18:43:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3439: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7626 >/dev/null 2>/dev/null
selfserv with PID 7626 found at Fri May 19 18:43:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3440: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7626 >/dev/null 2>/dev/null
selfserv with PID 7626 found at Fri May 19 18:43:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3441: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7626 >/dev/null 2>/dev/null
selfserv with PID 7626 found at Fri May 19 18:44:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3442: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 7626 >/dev/null 2>/dev/null
selfserv with PID 7626 found at Fri May 19 18:44:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3443: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 7626 >/dev/null 2>/dev/null
selfserv with PID 7626 found at Fri May 19 18:44:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3444: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7626 >/dev/null 2>/dev/null
selfserv with PID 7626 found at Fri May 19 18:44:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3445: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7626 >/dev/null 2>/dev/null
selfserv with PID 7626 found at Fri May 19 18:44:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3446: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7626 >/dev/null 2>/dev/null
selfserv with PID 7626 found at Fri May 19 18:44:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3447: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 7626 at Fri May 19 18:44:07 UTC 2017
kill -USR1 7626
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7626 killed at Fri May 19 18:44:07 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:44:07 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:44:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8308 >/dev/null 2>/dev/null
selfserv with PID 8308 found at Fri May 19 18:44:07 UTC 2017
selfserv with PID 8308 started at Fri May 19 18:44:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3448: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8308 >/dev/null 2>/dev/null
selfserv with PID 8308 found at Fri May 19 18:44:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3449: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8308 >/dev/null 2>/dev/null
selfserv with PID 8308 found at Fri May 19 18:44:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3450: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8308 >/dev/null 2>/dev/null
selfserv with PID 8308 found at Fri May 19 18:44:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3451: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8308 >/dev/null 2>/dev/null
selfserv with PID 8308 found at Fri May 19 18:44:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3452: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8308 at Fri May 19 18:44:11 UTC 2017
kill -USR1 8308
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8308 killed at Fri May 19 18:44:11 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Fri May 19 18:44:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:44:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8447 >/dev/null 2>/dev/null
selfserv with PID 8447 found at Fri May 19 18:44:11 UTC 2017
selfserv with PID 8447 started at Fri May 19 18:44:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3453: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8447 >/dev/null 2>/dev/null
selfserv with PID 8447 found at Fri May 19 18:44:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3454: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8447 >/dev/null 2>/dev/null
selfserv with PID 8447 found at Fri May 19 18:44:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3455: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8447 >/dev/null 2>/dev/null
selfserv with PID 8447 found at Fri May 19 18:44:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3456: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8447 >/dev/null 2>/dev/null
selfserv with PID 8447 found at Fri May 19 18:44:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3457: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 8447 >/dev/null 2>/dev/null
selfserv with PID 8447 found at Fri May 19 18:44:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3458: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 8447 >/dev/null 2>/dev/null
selfserv with PID 8447 found at Fri May 19 18:44:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3459: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 8447 >/dev/null 2>/dev/null
selfserv with PID 8447 found at Fri May 19 18:44:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3460: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 8447 >/dev/null 2>/dev/null
selfserv with PID 8447 found at Fri May 19 18:44:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3461: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 8447 >/dev/null 2>/dev/null
selfserv with PID 8447 found at Fri May 19 18:44:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3462: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 8447 >/dev/null 2>/dev/null
selfserv with PID 8447 found at Fri May 19 18:44:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3463: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 8447 >/dev/null 2>/dev/null
selfserv with PID 8447 found at Fri May 19 18:44:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3464: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 8447 >/dev/null 2>/dev/null
selfserv with PID 8447 found at Fri May 19 18:44:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3465: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 8447 >/dev/null 2>/dev/null
selfserv with PID 8447 found at Fri May 19 18:44:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3466: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 8447 >/dev/null 2>/dev/null
selfserv with PID 8447 found at Fri May 19 18:44:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2  \
        -f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3467: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8447 at Fri May 19 18:44:25 UTC 2017
kill -USR1 8447
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8447 killed at Fri May 19 18:44:25 UTC 2017
ssl.sh: SSL Client Authentication Extended Test - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  TLS Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 18:44:25 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:44:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8859 >/dev/null 2>/dev/null
selfserv with PID 8859 found at Fri May 19 18:44:26 UTC 2017
selfserv with PID 8859 started at Fri May 19 18:44:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3468: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8859 at Fri May 19 18:44:27 UTC 2017
kill -USR1 8859
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8859 killed at Fri May 19 18:44:27 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Fri May 19 18:44:27 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:44:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8916 >/dev/null 2>/dev/null
selfserv with PID 8916 found at Fri May 19 18:44:27 UTC 2017
selfserv with PID 8916 started at Fri May 19 18:44:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3469: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8916 at Fri May 19 18:44:33 UTC 2017
kill -USR1 8916
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8916 killed at Fri May 19 18:44:33 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Fri May 19 18:44:33 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:44:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8973 >/dev/null 2>/dev/null
selfserv with PID 8973 found at Fri May 19 18:44:33 UTC 2017
selfserv with PID 8973 started at Fri May 19 18:44:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3470: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8973 at Fri May 19 18:44:34 UTC 2017
kill -USR1 8973
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8973 killed at Fri May 19 18:44:34 UTC 2017
ssl.sh: skipping  SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Fri May 19 18:44:34 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:44:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9036 >/dev/null 2>/dev/null
selfserv with PID 9036 found at Fri May 19 18:44:34 UTC 2017
selfserv with PID 9036 started at Fri May 19 18:44:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3471: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9036 at Fri May 19 18:44:35 UTC 2017
kill -USR1 9036
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9036 killed at Fri May 19 18:44:35 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Fri May 19 18:44:35 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:44:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9093 >/dev/null 2>/dev/null
selfserv with PID 9093 found at Fri May 19 18:44:36 UTC 2017
selfserv with PID 9093 started at Fri May 19 18:44:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12227:
SSL peer was unable to negotiate an acceptable set of security parameters.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation.
tstclnt: exiting with return code 254
ssl.sh: #3472: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9093 at Fri May 19 18:44:37 UTC 2017
kill -USR1 9093
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9093 killed at Fri May 19 18:44:37 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Fri May 19 18:44:38 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:44:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9150 >/dev/null 2>/dev/null
selfserv with PID 9150 found at Fri May 19 18:44:38 UTC 2017
selfserv with PID 9150 started at Fri May 19 18:44:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3473: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9150 at Fri May 19 18:44:39 UTC 2017
kill -USR1 9150
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9150 killed at Fri May 19 18:44:39 UTC 2017
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 18:44:39 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:44:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9213 >/dev/null 2>/dev/null
selfserv with PID 9213 found at Fri May 19 18:44:39 UTC 2017
selfserv with PID 9213 started at Fri May 19 18:44:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3474: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9213 at Fri May 19 18:44:41 UTC 2017
kill -USR1 9213
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9213 killed at Fri May 19 18:44:41 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 18:44:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:44:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9270 >/dev/null 2>/dev/null
selfserv with PID 9270 found at Fri May 19 18:44:41 UTC 2017
selfserv with PID 9270 started at Fri May 19 18:44:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3475: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9270 at Fri May 19 18:44:47 UTC 2017
kill -USR1 9270
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9270 killed at Fri May 19 18:44:47 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 18:44:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:44:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9327 >/dev/null 2>/dev/null
selfserv with PID 9327 found at Fri May 19 18:44:47 UTC 2017
selfserv with PID 9327 started at Fri May 19 18:44:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3476: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9327 at Fri May 19 18:44:48 UTC 2017
kill -USR1 9327
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9327 killed at Fri May 19 18:44:48 UTC 2017
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 18:44:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:44:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9390 >/dev/null 2>/dev/null
selfserv with PID 9390 found at Fri May 19 18:44:49 UTC 2017
selfserv with PID 9390 started at Fri May 19 18:44:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3477: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9390 at Fri May 19 18:44:50 UTC 2017
kill -USR1 9390
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9390 killed at Fri May 19 18:44:50 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 18:44:50 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:44:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9447 >/dev/null 2>/dev/null
selfserv with PID 9447 found at Fri May 19 18:44:50 UTC 2017
selfserv with PID 9447 started at Fri May 19 18:44:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3478: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9447 at Fri May 19 18:44:56 UTC 2017
kill -USR1 9447
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9447 killed at Fri May 19 18:44:56 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 18:44:56 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:44:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9504 >/dev/null 2>/dev/null
selfserv with PID 9504 found at Fri May 19 18:44:56 UTC 2017
selfserv with PID 9504 started at Fri May 19 18:44:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3479: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9504 at Fri May 19 18:44:58 UTC 2017
kill -USR1 9504
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9504 killed at Fri May 19 18:44:58 UTC 2017
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Fri May 19 18:44:58 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:44:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9567 >/dev/null 2>/dev/null
selfserv with PID 9567 found at Fri May 19 18:44:58 UTC 2017
selfserv with PID 9567 started at Fri May 19 18:44:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3480: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9567 at Fri May 19 18:44:59 UTC 2017
kill -USR1 9567
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9567 killed at Fri May 19 18:44:59 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Fri May 19 18:44:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:44:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9624 >/dev/null 2>/dev/null
selfserv with PID 9624 found at Fri May 19 18:44:59 UTC 2017
selfserv with PID 9624 started at Fri May 19 18:44:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12227:
SSL peer was unable to negotiate an acceptable set of security parameters.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation.
tstclnt: exiting with return code 254
ssl.sh: #3481: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9624 at Fri May 19 18:45:01 UTC 2017
kill -USR1 9624
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9624 killed at Fri May 19 18:45:01 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Fri May 19 18:45:01 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9688 >/dev/null 2>/dev/null
selfserv with PID 9688 found at Fri May 19 18:45:01 UTC 2017
selfserv with PID 9688 started at Fri May 19 18:45:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3482: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9688 at Fri May 19 18:45:03 UTC 2017
kill -USR1 9688
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9688 killed at Fri May 19 18:45:03 UTC 2017
ssl.sh: skipping  TLS Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 18:45:03 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9776 >/dev/null 2>/dev/null
selfserv with PID 9776 found at Fri May 19 18:45:03 UTC 2017
selfserv with PID 9776 started at Fri May 19 18:45:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3483: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9776 at Fri May 19 18:45:09 UTC 2017
kill -USR1 9776
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9776 killed at Fri May 19 18:45:09 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 18:45:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9833 >/dev/null 2>/dev/null
selfserv with PID 9833 found at Fri May 19 18:45:09 UTC 2017
selfserv with PID 9833 started at Fri May 19 18:45:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3484: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9833 at Fri May 19 18:45:10 UTC 2017
kill -USR1 9833
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9833 killed at Fri May 19 18:45:10 UTC 2017
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Fri May 19 18:45:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9894 >/dev/null 2>/dev/null
selfserv with PID 9894 found at Fri May 19 18:45:11 UTC 2017
selfserv with PID 9894 started at Fri May 19 18:45:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12227:
SSL peer was unable to negotiate an acceptable set of security parameters.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation.
tstclnt: exiting with return code 254
ssl.sh: #3485: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9894 at Fri May 19 18:45:13 UTC 2017
kill -USR1 9894
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9894 killed at Fri May 19 18:45:13 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Fri May 19 18:45:13 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9951 >/dev/null 2>/dev/null
selfserv with PID 9951 found at Fri May 19 18:45:13 UTC 2017
selfserv with PID 9951 started at Fri May 19 18:45:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3486: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9951 at Fri May 19 18:45:14 UTC 2017
kill -USR1 9951
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9951 killed at Fri May 19 18:45:14 UTC 2017
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 18:45:14 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10012 >/dev/null 2>/dev/null
selfserv with PID 10012 found at Fri May 19 18:45:14 UTC 2017
selfserv with PID 10012 started at Fri May 19 18:45:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3487: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10012 at Fri May 19 18:45:20 UTC 2017
kill -USR1 10012
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10012 killed at Fri May 19 18:45:20 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 18:45:20 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10069 >/dev/null 2>/dev/null
selfserv with PID 10069 found at Fri May 19 18:45:20 UTC 2017
selfserv with PID 10069 started at Fri May 19 18:45:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3488: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10069 at Fri May 19 18:45:22 UTC 2017
kill -USR1 10069
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10069 killed at Fri May 19 18:45:22 UTC 2017
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 18:45:22 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10130 >/dev/null 2>/dev/null
selfserv with PID 10130 found at Fri May 19 18:45:22 UTC 2017
selfserv with PID 10130 started at Fri May 19 18:45:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12192:
Peer reports failure of signature verification or key exchange.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3489: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10130 at Fri May 19 18:45:28 UTC 2017
kill -USR1 10130
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10130 killed at Fri May 19 18:45:28 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 18:45:28 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10187 >/dev/null 2>/dev/null
selfserv with PID 10187 found at Fri May 19 18:45:28 UTC 2017
selfserv with PID 10187 started at Fri May 19 18:45:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3490: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10187 at Fri May 19 18:45:30 UTC 2017
kill -USR1 10187
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10187 killed at Fri May 19 18:45:30 UTC 2017
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Fri May 19 18:45:30 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10248 >/dev/null 2>/dev/null
selfserv with PID 10248 found at Fri May 19 18:45:30 UTC 2017
selfserv with PID 10248 started at Fri May 19 18:45:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12227:
SSL peer was unable to negotiate an acceptable set of security parameters.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation.
tstclnt: exiting with return code 254
ssl.sh: #3491: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10248 at Fri May 19 18:45:32 UTC 2017
kill -USR1 10248
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10248 killed at Fri May 19 18:45:32 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Fri May 19 18:45:32 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10306 >/dev/null 2>/dev/null
selfserv with PID 10306 found at Fri May 19 18:45:32 UTC 2017
selfserv with PID 10306 started at Fri May 19 18:45:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
         Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3492: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10306 at Fri May 19 18:45:34 UTC 2017
kill -USR1 10306
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10306 killed at Fri May 19 18:45:34 UTC 2017
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test Extended Test - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  Form is subject to the terms of the Mozilla Public (non-FIPS only)
ssl.sh: skipping  If a copy of the MPL was not distributed with this (non-FIPS only)
ssl.sh: skipping  obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  the stress tests for SSL/TLS. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  client                         Test Case name (non-FIPS only)
ssl.sh: skipping  params (non-FIPS only)
ssl.sh: skipping  ------                         --------------- (non-FIPS only)
ssl.sh: skipping  Stress SSL3 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Fri May 19 18:45:34 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10443 >/dev/null 2>/dev/null
selfserv with PID 10443 found at Fri May 19 18:45:35 UTC 2017
selfserv with PID 10443 started at Fri May 19 18:45:35 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:45:35 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:45:40 UTC 2017
ssl.sh: #3493: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10443 at Fri May 19 18:45:40 UTC 2017
kill -USR1 10443
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10443 killed at Fri May 19 18:45:40 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Fri May 19 18:45:40 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10516 >/dev/null 2>/dev/null
selfserv with PID 10516 found at Fri May 19 18:45:40 UTC 2017
selfserv with PID 10516 started at Fri May 19 18:45:40 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -c 100 -C c -N -n ExtendedSSLUser \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:45:40 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:45:45 UTC 2017
ssl.sh: #3494: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10516 at Fri May 19 18:45:45 UTC 2017
kill -USR1 10516
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10516 killed at Fri May 19 18:45:45 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Fri May 19 18:45:45 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10589 >/dev/null 2>/dev/null
selfserv with PID 10589 found at Fri May 19 18:45:46 UTC 2017
selfserv with PID 10589 started at Fri May 19 18:45:46 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:45:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:45:47 UTC 2017
ssl.sh: #3495: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10589 at Fri May 19 18:45:47 UTC 2017
kill -USR1 10589
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10589 killed at Fri May 19 18:45:47 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Fri May 19 18:45:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10663 >/dev/null 2>/dev/null
selfserv with PID 10663 found at Fri May 19 18:45:47 UTC 2017
selfserv with PID 10663 started at Fri May 19 18:45:47 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:45:47 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:45:48 UTC 2017
ssl.sh: #3496: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10663 at Fri May 19 18:45:48 UTC 2017
kill -USR1 10663
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10663 killed at Fri May 19 18:45:48 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Fri May 19 18:45:48 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10737 >/dev/null 2>/dev/null
selfserv with PID 10737 found at Fri May 19 18:45:48 UTC 2017
selfserv with PID 10737 started at Fri May 19 18:45:48 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:45:48 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:45:49 UTC 2017
ssl.sh: #3497: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10737 at Fri May 19 18:45:50 UTC 2017
kill -USR1 10737
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10737 killed at Fri May 19 18:45:50 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Fri May 19 18:45:50 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10811 >/dev/null 2>/dev/null
selfserv with PID 10811 found at Fri May 19 18:45:50 UTC 2017
selfserv with PID 10811 started at Fri May 19 18:45:50 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:45:50 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:45:51 UTC 2017
ssl.sh: #3498: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10811 at Fri May 19 18:45:51 UTC 2017
kill -USR1 10811
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10811 killed at Fri May 19 18:45:51 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Fri May 19 18:45:51 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10885 >/dev/null 2>/dev/null
selfserv with PID 10885 found at Fri May 19 18:45:51 UTC 2017
selfserv with PID 10885 started at Fri May 19 18:45:51 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z -g \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:45:51 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:45:52 UTC 2017
ssl.sh: #3499: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10885 at Fri May 19 18:45:53 UTC 2017
kill -USR1 10885
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10885 killed at Fri May 19 18:45:53 UTC 2017
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  ############################ (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-ECDSA AES 128 GCM (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA256 (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 GCM (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:45:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10995 >/dev/null 2>/dev/null
selfserv with PID 10995 found at Fri May 19 18:45:53 UTC 2017
selfserv with PID 10995 started at Fri May 19 18:45:53 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:45:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 18:45:56 UTC 2017
ssl.sh: #3500: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10995 at Fri May 19 18:45:56 UTC 2017
kill -USR1 10995
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10995 killed at Fri May 19 18:45:56 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Fri May 19 18:45:56 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11068 >/dev/null 2>/dev/null
selfserv with PID 11068 found at Fri May 19 18:45:56 UTC 2017
selfserv with PID 11068 started at Fri May 19 18:45:56 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:45:56 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:45:58 UTC 2017
ssl.sh: #3501: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11068 at Fri May 19 18:45:58 UTC 2017
kill -USR1 11068
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11068 killed at Fri May 19 18:45:58 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:45:58 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:45:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11142 >/dev/null 2>/dev/null
selfserv with PID 11142 found at Fri May 19 18:45:58 UTC 2017
selfserv with PID 11142 started at Fri May 19 18:45:58 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:45:58 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 18:46:01 UTC 2017
ssl.sh: #3502: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11142 at Fri May 19 18:46:01 UTC 2017
kill -USR1 11142
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11142 killed at Fri May 19 18:46:01 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:46:01 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:46:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11215 >/dev/null 2>/dev/null
selfserv with PID 11215 found at Fri May 19 18:46:01 UTC 2017
selfserv with PID 11215 started at Fri May 19 18:46:01 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:46:01 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Fri May 19 18:46:02 UTC 2017
ssl.sh: #3503: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11215 at Fri May 19 18:46:02 UTC 2017
kill -USR1 11215
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11215 killed at Fri May 19 18:46:03 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Fri May 19 18:46:03 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:46:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11288 >/dev/null 2>/dev/null
selfserv with PID 11288 found at Fri May 19 18:46:03 UTC 2017
selfserv with PID 11288 started at Fri May 19 18:46:03 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:46:03 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:46:04 UTC 2017
ssl.sh: #3504: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11288 at Fri May 19 18:46:04 UTC 2017
kill -USR1 11288
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11288 killed at Fri May 19 18:46:04 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Fri May 19 18:46:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:46:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11362 >/dev/null 2>/dev/null
selfserv with PID 11362 found at Fri May 19 18:46:04 UTC 2017
selfserv with PID 11362 started at Fri May 19 18:46:04 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:46:04 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Fri May 19 18:46:06 UTC 2017
ssl.sh: #3505: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11362 at Fri May 19 18:46:06 UTC 2017
kill -USR1 11362
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11362 killed at Fri May 19 18:46:06 UTC 2017
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  ############################ (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) (non-FIPS only)
ssl.sh: skipping  -V_ssl3:tls1.2_-c_1000_-C_:0038_-u Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (session ticket) (non-FIPS only)
ssl.sh: skipping  session ticket test, once session tickets with DHE_DSS are working (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  -V_ssl3:tls1.2_-c_1000_-C_:006A    Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (non-FIPS only)
ssl.sh: skipping  reuse test, once the session cache with DHE_DSS is working (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Fri May 19 18:46:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:46:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11474 >/dev/null 2>/dev/null
selfserv with PID 11474 found at Fri May 19 18:46:06 UTC 2017
selfserv with PID 11474 started at Fri May 19 18:46:06 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:46:06 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Fri May 19 18:46:22 UTC 2017
ssl.sh: #3506: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11474 at Fri May 19 18:46:22 UTC 2017
kill -USR1 11474
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11474 killed at Fri May 19 18:46:22 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Fri May 19 18:46:22 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:46:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11547 >/dev/null 2>/dev/null
selfserv with PID 11547 found at Fri May 19 18:46:22 UTC 2017
selfserv with PID 11547 started at Fri May 19 18:46:22 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:46:22 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Fri May 19 18:46:25 UTC 2017
ssl.sh: #3507: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11547 at Fri May 19 18:46:25 UTC 2017
kill -USR1 11547
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11547 killed at Fri May 19 18:46:25 UTC 2017
ssl.sh: skipping  session ticket test, once session tickets with DHE_DSS are working (non-FIPS only)
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Fri May 19 18:46:25 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:46:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11633 >/dev/null 2>/dev/null
selfserv with PID 11633 found at Fri May 19 18:46:25 UTC 2017
selfserv with PID 11633 started at Fri May 19 18:46:25 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:46:25 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 18:48:51 UTC 2017
ssl.sh: #3508: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11633 at Fri May 19 18:48:51 UTC 2017
kill -USR1 11633
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11633 killed at Fri May 19 18:48:51 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Fri May 19 18:48:51 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1  \
         -e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.8458\
         -V ssl3:tls1.2  -H 1 &
trying to connect to selfserv at Fri May 19 18:48:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1  -q \
        -d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11707 >/dev/null 2>/dev/null
selfserv with PID 11707 found at Fri May 19 18:48:51 UTC 2017
selfserv with PID 11707 started at Fri May 19 18:48:51 UTC 2017
strsclnt -q -p 8443 -d ../ext_client  -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n ExtendedSSLUser-dsa \
         -V ssl3:tls1.2  127.0.0.1
strsclnt started at Fri May 19 18:48:51 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Fri May 19 18:51:24 UTC 2017
ssl.sh: #3509: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11707 at Fri May 19 18:51:24 UTC 2017
kill -USR1 11707
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11707 killed at Fri May 19 18:51:24 UTC 2017
ssl.sh: SSL - FIPS mode off for client ===============================
ssl.sh: Turning FIPS off for the  client
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -fips false -force
FIPS mode disabled.
ssl.sh: #3510:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/client -list
ssl.sh: #3511:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #3512:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: Turning FIPS off for the extended  client
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -fips false -force
FIPS mode disabled.
ssl.sh: #3513:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/ext_client -list
ssl.sh: #3514:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #3515:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
TIMESTAMP ssl END: Fri May 19 18:51:26 UTC 2017
Running tests for ocsp
TIMESTAMP ocsp BEGIN: Fri May 19 18:51:26 UTC 2017
ocsp.sh: OCSP tests ===============================
TIMESTAMP ocsp END: Fri May 19 18:51:26 UTC 2017
Running tests for merge
TIMESTAMP merge BEGIN: Fri May 19 18:51:26 UTC 2017
merge.sh: Merge Tests ===============================
merge.sh: Creating an SDR key & Encrypt
sdrtest -d . -o /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests.v3.8458 -t Test2 -f ../tests.pw
merge.sh: #3516: Creating SDR Key  - PASSED
merge.sh: Merging in Key for Existing user
certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3517: Merging Dave  - PASSED
merge.sh: Merging in new user 
certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3518: Merging server  - PASSED
merge.sh: Merging in new chain 
certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3519: Merging ext_client  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3520: Merging conflicting nicknames 1  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3521: Merging conflicting nicknames 2  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #4)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 45 (0x2d)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:08:48 2017
            Not After : Thu May 19 17:08:48 2022
        Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:bd:ae:5c:71:7b:2f:1c:89:aa:91:16:26:64:5a:6d:
                    89:92:1b:8b:08:77:c8:bc:99:e9:20:2a:59:80:99:b1:
                    7b:8d:b7:d9:69:94:ec:82:17:63:ae:2f:92:4f:83:6b:
                    50:c9:f9:1b:fa:b2:b2:b3:e8:5e:c1:73:bc:65:2e:6f:
                    c8:68:f4:87:10:9f:d4:82:3c:07:a9:84:0d:5c:6b:4c:
                    5b:48:13:e0:6b:a9:30:59:c8:03:76:4c:1c:81:03:ea:
                    8d:f7:05:61:80:40:fc:74:56:82:b6:b5:d3:79:8a:64:
                    05:12:da:e3:68:1d:3f:a6:59:2b:78:ec:4e:db:e9:0c:
                    5c:d9:ad:3e:b6:1a:83:72:fb:60:a9:2d:ba:e1:90:fe:
                    8f:d3:d7:6d:06:d5:29:30:ba:75:5f:ae:fc:5e:a1:d2:
                    80:15:d2:56:cc:25:cd:7b:78:48:5d:69:d1:b9:63:ba:
                    2b:2a:98:a9:b8:4b:58:6a:a0:e7:17:44:8c:9f:0f:a9:
                    11:85:b7:46:4e:54:ee:30:78:c7:08:93:de:77:e3:dc:
                    d6:6b:9b:a9:2e:5c:78:1e:9c:00:86:7f:36:26:e6:4a:
                    58:49:03:71:17:0f:6e:ef:b4:22:38:93:c0:96:37:35:
                    5c:2c:bc:d5:d6:a1:f9:8a:97:f0:2a:aa:70:dc:aa:21
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        99:ad:a9:6a:93:d3:0b:98:56:4d:36:6a:77:5b:dc:e3:
        78:5c:31:b9:8d:64:e3:05:2d:b1:af:85:1b:6f:4b:09:
        d3:93:87:33:1b:ca:1a:23:fc:85:8a:39:b4:6d:10:26:
        72:c2:12:8b:e3:79:52:22:8f:30:d8:bb:da:0a:dc:a6:
        50:9c:fa:0f:73:18:be:15:53:8e:98:92:b6:18:3c:b2:
        a7:82:35:c3:a4:29:5f:95:4f:05:73:f2:ef:16:98:3d:
        19:25:53:6f:06:cc:e7:a0:5b:45:03:c7:50:b3:cc:8e:
        35:21:3f:f2:45:f2:aa:e3:17:63:ae:d2:6a:bb:61:e1:
        2f:db:a2:8f:76:fb:26:02:da:b8:06:e0:10:fd:23:3d:
        d3:73:0a:36:7c:a4:51:f5:d8:7e:8e:4f:3f:88:27:1e:
        aa:02:f2:c4:4e:ca:09:7b:f8:de:87:42:5e:8e:41:d0:
        6c:72:74:aa:ba:fa:d3:3c:a4:44:57:32:d7:07:70:93:
        5f:56:02:ed:c3:c3:f7:fd:b0:01:ab:ea:76:08:ed:2f:
        62:b3:ef:d2:07:19:38:b2:6f:50:04:34:80:91:9d:75:
        f4:97:be:71:7b:81:c5:fb:74:4f:d2:cc:00:e7:bc:d6:
        1c:ce:0a:f3:5d:c7:17:e5:f3:43:92:23:ce:3e:12:ec
    Fingerprint (SHA-256):
        BA:AD:CC:E4:06:C7:BE:1F:95:FB:51:0E:9F:FD:98:17:AC:C1:68:BA:1F:27:7E:0F:A0:BA:E8:3F:B8:70:9D:C9
    Fingerprint (SHA1):
        EA:69:DD:EC:D9:5F:E1:45:D3:B3:C5:CA:BC:53:9F:73:FA:06:FB:1B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #3522: Verify nicknames were deconflicted (Alice #4)  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #100)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 46 (0x2e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Fri May 19 17:08:59 2017
            Not After : Thu May 19 17:08:59 2022
        Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:a2:3e:9b:3e:ad:5f:db:1a:83:73:93:14:59:a7:ce:
                    98:11:73:4a:65:47:0e:b8:56:21:8b:fe:fc:d2:1d:56:
                    8b:d3:f5:e5:97:e0:bc:a9:1f:68:d3:e1:07:06:0f:74:
                    ec:6c:ac:d7:17:91:e0:5e:ff:f5:3b:da:9b:83:0c:35:
                    68:ab:6e:1a:fc:79:68:18:bc:03:3d:43:b7:51:b5:e4:
                    db:a0:77:9b:39:2e:8e:70:23:f2:af:2e:a5:99:93:2b:
                    9c:16:d8:48:85:e3:54:6b:5a:3a:f5:87:5a:ca:d2:1c:
                    e1:9c:f5:c5:b4:31:dd:c4:9d:ec:51:09:dc:0a:6b:2a:
                    4d:a7:80:14:35:aa:82:a0:c9:ea:c9:f2:44:8a:24:38:
                    0d:b8:61:bb:72:83:64:57:13:82:da:c3:e6:69:b1:a4:
                    e4:ff:60:30:8c:ec:5e:19:a5:23:9f:f8:f2:be:37:93:
                    c4:e8:cb:98:fe:3b:85:bd:c1:86:b3:48:16:77:b5:e8:
                    94:b7:14:ff:a0:b9:08:3f:90:15:2d:a8:29:fe:b3:72:
                    e0:e6:6e:ff:7f:d9:e1:9d:4e:02:40:61:73:1b:2b:bc:
                    68:82:fe:4c:e4:2e:5e:32:e0:92:f9:ec:fe:ca:99:32:
                    93:9b:39:ba:cc:46:e4:4e:4d:82:ec:55:9f:1c:cf:bf
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        56:99:50:2b:5a:63:2a:f3:93:cb:62:97:6a:f8:4e:a8:
        87:61:10:f7:50:80:a4:d5:8b:3c:d1:b4:16:38:ff:04:
        a4:64:cf:b2:1b:db:2a:a8:23:bd:bf:47:57:bc:b7:4e:
        f1:cb:77:fc:9b:94:c0:e3:ef:32:0f:96:ce:8c:22:e7:
        12:5c:31:9a:25:37:c9:fd:07:d2:09:4b:88:e6:94:ac:
        6c:ae:01:bd:87:1f:63:89:d7:a6:b1:04:13:5b:58:71:
        08:38:6b:9f:79:50:6a:78:fc:81:fa:83:0e:59:9f:e8:
        9f:f8:6a:67:a6:3b:b4:b2:39:3b:82:dd:a9:e0:5c:61:
        32:b5:5a:a3:e5:48:52:24:da:94:f3:96:d3:db:ae:3e:
        bb:2f:a0:a6:9b:ad:6c:8c:c3:0a:58:7e:06:d5:53:d4:
        8a:0f:79:04:04:0f:46:fc:00:02:23:73:f4:15:d5:b4:
        74:ac:65:0b:69:72:04:5c:cf:d2:41:96:aa:0f:55:41:
        41:d9:98:9e:68:8c:6f:76:26:55:98:c5:8c:bb:03:5a:
        e2:53:01:27:15:89:3b:d8:a3:2d:6b:c0:20:a0:0b:13:
        b6:ed:bd:ed:42:c7:d3:ab:58:fa:66:f4:00:aa:5f:22:
        ec:e5:e0:65:0a:ab:f8:23:4e:ba:72:4a:4f:44:6d:1f
    Fingerprint (SHA-256):
        27:D9:F0:C4:3B:CB:53:4F:CF:0E:F5:C8:E0:81:CE:55:05:E6:94:29:9C:69:B5:FE:B3:20:D9:28:4C:6D:0A:FA
    Fingerprint (SHA1):
        F0:96:FA:77:BB:A9:CB:4C:AF:56:D3:8A:AC:FE:F9:6E:E9:80:9E:1F

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #3523: Verify nicknames were deconflicted (Alice #100)  - PASSED
merge.sh: Merging in SDR 
certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3524: Merging SDR  - PASSED

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

TestCA-dsa                                                   CT,C,C
Alice-ec                                                     u,u,u
Dave                                                         u,u,u
127.0.0.1-dsamixed                                           ,,   
serverCA-dsa                                                 C,C,C
chain-2-clientCA-ec                                          ,,   
Alice #1                                                     ,,   
Dave-dsa                                                     ,,   
127.0.0.1-ecmixed                                            ,,   
testbuildd-sni.(none)-dsamixed                               ,,   
Alice #99                                                    ,,   
Alice-dsamixed                                               u,u,u
eve@bogus.com                                                ,,   
bob-ec@bogus.com                                             ,,   
127.0.0.1                                                    u,u,u
testbuildd-sni.(none)-ecmixed                                ,,   
clientCA                                                     T,C,C
Alice #3                                                     ,,   
TestCA                                                       CT,C,C
TestCA-ec                                                    CT,C,C
Alice-ecmixed                                                u,u,u
Dave-ecmixed                                                 ,,   
127.0.0.1-dsa                                                ,,   
testbuildd-sni.(none)                                        u,u,u
testbuildd-sni.(none)-ec                                     ,,   
ExtendedSSLUser                                              u,u,u
serverCA                                                     C,C,C
ExtendedSSLUser-ec                                           ,,   
serverCA-ec                                                  C,C,C
chain-1-clientCA                                             ,,   
clientCA-dsa                                                 T,C,C
chain-1-clientCA-ec                                          ,,   
Alice #2                                                     ,,   
Alice #4                                                     ,,   
Alice                                                        u,u,u
Dave-ec                                                      ,,   
testbuildd-sni.(none)-dsa                                    ,,   
ExtendedSSLUser-dsa                                          ,,   
ExtendedSSLUser-ecmixed                                      ,,   
chain-2-clientCA                                             ,,   
chain-1-clientCA-dsa                                         ,,   
Alice #100                                                   ,,   
Alice-dsa                                                    u,u,u
ExtendedSSLUser-dsamixed                                     ,,   
chain-2-clientCA-dsa                                         ,,   
bob@bogus.com                                                ,,   
Dave-dsamixed                                                ,,   
127.0.0.1-ec                                                 ,,   
clientCA-ec                                                  T,C,C


CRL names                                CRL Type

TestCA                                   CRL  
TestCA-ec                                CRL  
merge.sh: Decrypt - With Original SDR Key
sdrtest -d . -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests.v3.8458 -t Test2 -f ../tests.pw
merge.sh: #3525: Decrypt - Value 3  - PASSED
merge.sh: Decrypt - With Merged SDR Key
sdrtest -d . -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests.v1.8458 -t Test1 -f ../tests.pw
merge.sh: #3526: Decrypt - Value 1  - PASSED
merge.sh: Signing with merged key  ------------------
cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig
merge.sh: #3527: Create Detached Signature Dave . - PASSED
cmsutil -D -i dave.dsig -c alice.txt -d . 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
merge.sh: #3528: Verifying Dave's Detached Signature  - PASSED
merge.sh: verifying  merged cert  ------------------
certutil -V -n ExtendedSSLUser -u C -d .
certutil: certificate is valid
merge.sh: #3529: Verifying ExtendedSSL User Cert  - PASSED
merge.sh: verifying  merged crl  ------------------
crlutil -L -n TestCA -d .
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US"
    This Update: Fri May 19 17:10:16 2017
    Entry 1 (0x1):
        Serial Number: 40 (0x28)
        Revocation Date: Fri May 19 16:59:22 2017
        Entry Extensions:
            Name: CRL reason code

    Entry 2 (0x2):
        Serial Number: 42 (0x2a)
        Revocation Date: Fri May 19 17:10:11 2017
    CRL Extensions:
        Name: Certificate Issuer Alt Name
        RFC822 Name: "caemail@ca.com"
        DNS name: "ca.com"
        Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo
            rnia,C=US"
        URI: "http://ca.com"
        IP Address:
            87:0b:31:39:32:2e:31:36:38:2e:30:2e:31

merge.sh: #3530: Verifying TestCA CRL  - PASSED
TIMESTAMP merge END: Fri May 19 18:51:29 UTC 2017
Running tests for pkits
TIMESTAMP pkits BEGIN: Fri May 19 18:51:29 UTC 2017
pkits.sh: PKITS data directory not defined, skipping.
TIMESTAMP pkits END: Fri May 19 18:51:29 UTC 2017
Running tests for chains
TIMESTAMP chains BEGIN: Fri May 19 18:51:29 UTC 2017
chains.sh: Certificate Chains Tests ===============================
chains.sh: Creating DB OCSPRootDB
certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd
chains.sh: #3531: OCSPD: Creating DB OCSPRootDB  - PASSED
chains.sh: Creating Root CA OCSPRoot
certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot  -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185130 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3532: OCSPD: Creating Root CA OCSPRoot  - PASSED
chains.sh: Exporting Root CA OCSPRoot.der
certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der
chains.sh: #3533: OCSPD: Exporting Root CA OCSPRoot.der  - PASSED
chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss
pk12util: PKCS12 EXPORT SUCCESSFUL
chains.sh: #3534: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database  - PASSED
chains.sh: Creating DB OCSPCA1DB
certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd
chains.sh: #3535: OCSPD: Creating DB OCSPCA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der
certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US"  -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o OCSPCA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3536: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der  - PASSED
chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot
certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3537: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot  - PASSED
chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database
certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3538: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database  - PASSED
chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss
pk12util: PKCS12 EXPORT SUCCESSFUL
chains.sh: #3539: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database  - PASSED
chains.sh: Creating DB OCSPCA2DB
certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd
chains.sh: #3540: OCSPD: Creating DB OCSPCA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der
certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US"  -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o OCSPCA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3541: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der  - PASSED
chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot
certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3542: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot  - PASSED
chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database
certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3543: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database  - PASSED
chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss
pk12util: PKCS12 EXPORT SUCCESSFUL
chains.sh: #3544: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database  - PASSED
chains.sh: Creating DB OCSPCA3DB
certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd
chains.sh: #3545: OCSPD: Creating DB OCSPCA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der
certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US"  -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o OCSPCA3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3546: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der  - PASSED
chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot
certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8642
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3547: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot  - PASSED
chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database
certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3548: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database  - PASSED
chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss
pk12util: PKCS12 EXPORT SUCCESSFUL
chains.sh: #3549: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database  - PASSED
chains.sh: Creating DB OCSPEE11DB
certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd
chains.sh: #3550: OCSPD: Creating DB OCSPEE11DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE11Req.der
certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US"  -R  -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o OCSPEE11Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3551: OCSPD: Creating EE certifiate request OCSPEE11Req.der  - PASSED
chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1
certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3552: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1  - PASSED
chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database
certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3553: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database  - PASSED
chains.sh: Creating DB OCSPEE12DB
certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd
chains.sh: #3554: OCSPD: Creating DB OCSPEE12DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE12Req.der
certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US"  -R  -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o OCSPEE12Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3555: OCSPD: Creating EE certifiate request OCSPEE12Req.der  - PASSED
chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1
certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3556: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1  - PASSED
chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database
certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3557: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database  - PASSED
chains.sh: Creating DB OCSPEE13DB
certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd
chains.sh: #3558: OCSPD: Creating DB OCSPEE13DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE13Req.der
certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US"  -R  -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o OCSPEE13Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3559: OCSPD: Creating EE certifiate request OCSPEE13Req.der  - PASSED
chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1
certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3560: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1  - PASSED
chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database
certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3561: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database  - PASSED
chains.sh: Creating DB OCSPEE14DB
certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd
chains.sh: #3562: OCSPD: Creating DB OCSPEE14DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE14Req.der
certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US"  -R  -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o OCSPEE14Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3563: OCSPD: Creating EE certifiate request OCSPEE14Req.der  - PASSED
chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1
certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3564: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1  - PASSED
chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database
certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3565: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database  - PASSED
chains.sh: Creating DB OCSPEE15DB
certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd
chains.sh: #3566: OCSPD: Creating DB OCSPEE15DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE15Req.der
certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US"  -R  -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o OCSPEE15Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3567: OCSPD: Creating EE certifiate request OCSPEE15Req.der  - PASSED
chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1
certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8642
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3568: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1  - PASSED
chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database
certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3569: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database  - PASSED
chains.sh: Creating DB OCSPEE21DB
certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd
chains.sh: #3570: OCSPD: Creating DB OCSPEE21DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE21Req.der
certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US"  -R  -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o OCSPEE21Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3571: OCSPD: Creating EE certifiate request OCSPEE21Req.der  - PASSED
chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2
certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3572: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2  - PASSED
chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database
certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3573: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database  - PASSED
chains.sh: Creating DB OCSPEE22DB
certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd
chains.sh: #3574: OCSPD: Creating DB OCSPEE22DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE22Req.der
certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US"  -R  -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o OCSPEE22Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3575: OCSPD: Creating EE certifiate request OCSPEE22Req.der  - PASSED
chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2
certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3576: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2  - PASSED
chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database
certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3577: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database  - PASSED
chains.sh: Creating DB OCSPEE23DB
certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd
chains.sh: #3578: OCSPD: Creating DB OCSPEE23DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE23Req.der
certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US"  -R  -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o OCSPEE23Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3579: OCSPD: Creating EE certifiate request OCSPEE23Req.der  - PASSED
chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2
certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8642
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3580: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2  - PASSED
chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database
certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3581: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database  - PASSED
chains.sh: Creating DB OCSPEE31DB
certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd
chains.sh: #3582: OCSPD: Creating DB OCSPEE31DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE31Req.der
certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US"  -R  -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o OCSPEE31Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3583: OCSPD: Creating EE certifiate request OCSPEE31Req.der  - PASSED
chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3
certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3584: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3  - PASSED
chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database
certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3585: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database  - PASSED
chains.sh: Creating DB OCSPEE32DB
certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd
chains.sh: #3586: OCSPD: Creating DB OCSPEE32DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE32Req.der
certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US"  -R  -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o OCSPEE32Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3587: OCSPD: Creating EE certifiate request OCSPEE32Req.der  - PASSED
chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3
certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8641/ocsp
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3588: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3  - PASSED
chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database
certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3589: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database  - PASSED
chains.sh: Creating DB OCSPEE33DB
certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd
chains.sh: #3590: OCSPD: Creating DB OCSPEE33DB  - PASSED
chains.sh: Creating EE certifiate request OCSPEE33Req.der
certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US"  -R  -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o OCSPEE33Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3591: OCSPD: Creating EE certifiate request OCSPEE33Req.der  - PASSED
chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3
certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
2
7
http://127.0.0.1:8642
0
n
n

===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3592: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3  - PASSED
chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database
certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3593: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database  - PASSED
chains.sh: Create CRL for OCSPRootDB
crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl
=== Crlutil input data ===
update=20170519185341Z
nextupdate=20180519185341Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
    This Update: Fri May 19 18:53:41 2017
    Next Update: Sat May 19 18:53:41 2018
    CRL Extensions:
chains.sh: #3594: OCSPD: Create CRL for OCSPRootDB  - PASSED
chains.sh: Revoking certificate with SN 2 issued by OCSPRoot
crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl
=== Crlutil input data ===
update=20170519185342Z
addcert 2 20170519185342Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
    This Update: Fri May 19 18:53:42 2017
    Next Update: Sat May 19 18:53:41 2018
    Entry 1 (0x1):
        Serial Number: 2 (0x2)
        Revocation Date: Fri May 19 18:53:42 2017
    CRL Extensions:
chains.sh: #3595: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot  - PASSED
chains.sh: Create CRL for OCSPCA1DB
crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20170519185342Z
nextupdate=20180519185342Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Fri May 19 18:53:42 2017
    Next Update: Sat May 19 18:53:42 2018
    CRL Extensions:
chains.sh: #3596: OCSPD: Create CRL for OCSPCA1DB  - PASSED
chains.sh: Revoking certificate with SN 2 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20170519185343Z
addcert 2 20170519185343Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Fri May 19 18:53:43 2017
    Next Update: Sat May 19 18:53:42 2018
    Entry 1 (0x1):
        Serial Number: 2 (0x2)
        Revocation Date: Fri May 19 18:53:43 2017
    CRL Extensions:
chains.sh: #3597: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1  - PASSED
chains.sh: Revoking certificate with SN 4 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20170519185344Z
addcert 4 20170519185344Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Fri May 19 18:53:44 2017
    Next Update: Sat May 19 18:53:42 2018
    Entry 1 (0x1):
        Serial Number: 2 (0x2)
        Revocation Date: Fri May 19 18:53:43 2017
    Entry 2 (0x2):
        Serial Number: 4 (0x4)
        Revocation Date: Fri May 19 18:53:44 2017
    CRL Extensions:
chains.sh: #3598: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1  - PASSED
chains.sh: Create CRL for OCSPCA2DB
crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl
=== Crlutil input data ===
update=20170519185344Z
nextupdate=20180519185344Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
    This Update: Fri May 19 18:53:44 2017
    Next Update: Sat May 19 18:53:44 2018
    CRL Extensions:
chains.sh: #3599: OCSPD: Create CRL for OCSPCA2DB  - PASSED
chains.sh: Revoking certificate with SN 2 issued by OCSPCA2
crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl
=== Crlutil input data ===
update=20170519185345Z
addcert 2 20170519185345Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
    This Update: Fri May 19 18:53:45 2017
    Next Update: Sat May 19 18:53:44 2018
    Entry 1 (0x1):
        Serial Number: 2 (0x2)
        Revocation Date: Fri May 19 18:53:45 2017
    CRL Extensions:
chains.sh: #3600: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2  - PASSED
chains.sh: Revoking certificate with SN 3 issued by OCSPCA2
crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl
=== Crlutil input data ===
update=20170519185346Z
addcert 3 20170519185346Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
    This Update: Fri May 19 18:53:46 2017
    Next Update: Sat May 19 18:53:44 2018
    Entry 1 (0x1):
        Serial Number: 2 (0x2)
        Revocation Date: Fri May 19 18:53:45 2017
    Entry 2 (0x2):
        Serial Number: 3 (0x3)
        Revocation Date: Fri May 19 18:53:46 2017
    CRL Extensions:
chains.sh: #3601: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2  - PASSED
chains.sh: Create CRL for OCSPCA3DB
crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl
=== Crlutil input data ===
update=20170519185347Z
nextupdate=20180519185347Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
    This Update: Fri May 19 18:53:47 2017
    Next Update: Sat May 19 18:53:47 2018
    CRL Extensions:
chains.sh: #3602: OCSPD: Create CRL for OCSPCA3DB  - PASSED
chains.sh: Revoking certificate with SN 2 issued by OCSPCA3
crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl
=== Crlutil input data ===
update=20170519185348Z
addcert 2 20170519185348Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
    This Update: Fri May 19 18:53:48 2017
    Next Update: Sat May 19 18:53:47 2018
    Entry 1 (0x1):
        Serial Number: 2 (0x2)
        Revocation Date: Fri May 19 18:53:48 2017
    CRL Extensions:
chains.sh: #3603: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3  - PASSED
chains.sh: Revoking certificate with SN 3 issued by OCSPCA3
crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl
=== Crlutil input data ===
update=20170519185349Z
addcert 3 20170519185349Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
    This Update: Fri May 19 18:53:49 2017
    Next Update: Sat May 19 18:53:47 2018
    Entry 1 (0x1):
        Serial Number: 2 (0x2)
        Revocation Date: Fri May 19 18:53:48 2017
    Entry 2 (0x2):
        Serial Number: 3 (0x3)
        Revocation Date: Fri May 19 18:53:49 2017
    CRL Extensions:
chains.sh: #3604: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3  - PASSED
chains.sh: Creating DB ServerDB
certutil -N -d ServerDB -f ServerDB/dbpasswd
chains.sh: #3605: OCSPD: Creating DB ServerDB  - PASSED
chains.sh: Importing certificate OCSPRoot.der to ServerDB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der
chains.sh: #3606: OCSPD: Importing certificate OCSPRoot.der to ServerDB database  - PASSED
chains.sh: Importing CRL OCSPRoot.crl to ServerDB database
crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl
chains.sh: #3607: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database  - PASSED
chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #3608: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database  - PASSED
chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #3609: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database  - PASSED
chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #3610: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database  - PASSED
chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #3611: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database  - PASSED
chains.sh: Creating DB ClientDB
certutil -N -d ClientDB -f ClientDB/dbpasswd
chains.sh: #3612: OCSPD: Creating DB ClientDB  - PASSED
chains.sh: Importing certificate OCSPRoot.der to ClientDB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der
chains.sh: #3613: OCSPD: Importing certificate OCSPRoot.der to ClientDB database  - PASSED
chains.sh: Importing CRL OCSPRoot.crl to ClientDB database
crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl
chains.sh: #3614: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database
certutil -A -n OCSPCA1OCSPRoot  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der
chains.sh: #3615: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database
certutil -A -n OCSPCA2OCSPRoot  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der
chains.sh: #3616: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database
certutil -A -n OCSPCA3OCSPRoot  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der
chains.sh: #3617: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database
certutil -A -n OCSPEE11OCSPCA1  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der
chains.sh: #3618: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database
certutil -A -n OCSPEE12OCSPCA1  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der
chains.sh: #3619: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database
certutil -A -n OCSPEE13OCSPCA1  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der
chains.sh: #3620: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database
certutil -A -n OCSPEE14OCSPCA1  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der
chains.sh: #3621: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database
certutil -A -n OCSPEE15OCSPCA1  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der
chains.sh: #3622: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database
certutil -A -n OCSPEE21OCSPCA2  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der
chains.sh: #3623: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database
certutil -A -n OCSPEE22OCSPCA2  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der
chains.sh: #3624: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database
certutil -A -n OCSPEE23OCSPCA2  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der
chains.sh: #3625: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database
certutil -A -n OCSPEE31OCSPCA3  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der
chains.sh: #3626: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database
certutil -A -n OCSPEE32OCSPCA3  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der
chains.sh: #3627: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database  - PASSED
chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database
certutil -A -n OCSPEE33OCSPCA3  -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der
chains.sh: #3628: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database  - PASSED
httpserv starting at Fri May 19 18:53:53 UTC 2017
httpserv -D -p 8641  \
         -A OCSPRoot -C /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/OCSPCA1.crl \
         -A OCSPCA2  -C /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/OCSPCA2.crl  -A OCSPCA3 -C /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/OCSPCA3.crl \
         -O get -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/ServerDB/ -f /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/ServerDB/dbpasswd \
         -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/aiahttp/http_pid.8458  &
trying to connect to httpserv at Fri May 19 18:53:53 UTC 2017
tstclnt -p 8641 -h 127.0.0.1 -q -v
tstclnt: connecting to 127.0.0.1:8641 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13787 >/dev/null 2>/dev/null
httpserv with PID 13787 found at Fri May 19 18:53:53 UTC 2017
httpserv with PID 13787 started at Fri May 19 18:53:53 UTC 2017
tstclnt -h 127.0.0.1 -p 8641 -q -t 20
chains.sh: #3629: Test that OCSP server is reachable - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp   -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185130 (0x1ef222ea)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Fri May 19 18:51:39 2017
            Not After : Thu May 19 18:51:39 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:54:eb:22:7b:de:a7:9e:e1:77:34:08:87:b3:00:63:
                    41:3b:c2:97:d0:9e:b2:bc:de:7e:f7:22:ae:b4:a8:fe:
                    db:bb:44:3a:6f:c1:ba:0f:8a:be:42:39:45:77:62:e9:
                    28:ce:1e:3e:0e:c2:e5:d2:bd:c7:7f:71:40:ab:67:36:
                    3c:9c:d4:11:ea:7b:8b:58:5d:2a:2e:81:bd:e4:89:ab:
                    ad:9c:23:3f:f9:ef:e7:bb:7b:89:21:75:fe:74:cc:7c:
                    9a:6a:48:5f:c2:0a:34:e8:86:80:cb:28:8e:24:45:71:
                    34:14:e8:0e:56:25:42:d8:cf:b7:71:df:d0:65:d8:eb:
                    67:89:24:4e:6e:0b:60:5e:9c:01:f0:18:42:e9:06:13:
                    11:41:70:05:6d:85:e9:fe:c1:96:67:f3:44:9d:ea:13:
                    b9:bd:85:ca:54:cb:a4:2a:bf:12:61:48:77:e7:3e:b5:
                    f2:d6:73:bf:22:d3:8c:c6:b5:7f:be:49:fb:55:f1:4d:
                    db:53:15:c7:66:d8:13:c3:01:25:56:11:19:e4:e8:2a:
                    b9:56:4d:11:0c:c0:bd:9e:da:79:b4:ed:57:78:40:57:
                    1c:43:67:00:60:1c:b7:60:4c:58:87:91:74:9a:23:bd:
                    aa:13:ce:ce:49:57:00:c4:55:e5:2e:9a:83:e8:df:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a0:ce:f5:c6:31:24:13:46:6f:1c:22:4f:09:e3:6f:f2:
        75:47:de:9a:6e:fa:d5:dc:22:29:37:7b:0c:91:36:75:
        a3:d8:d5:62:1b:65:5e:de:a7:3e:71:a7:96:61:5e:ef:
        5e:b3:0f:b6:a7:c3:93:c0:26:de:1f:cf:a8:f7:eb:94:
        61:fe:0d:c1:f6:ec:17:a7:30:6f:1a:5f:9e:33:28:a8:
        67:c5:c6:80:d0:41:18:7e:bf:06:4d:2a:9b:d3:a4:c4:
        c2:0a:15:c5:3b:f2:a4:65:9d:7f:53:0f:07:a8:b5:77:
        e0:65:42:5a:db:29:8f:36:c6:e1:54:1e:ca:2c:60:63:
        15:0c:e8:21:9c:fe:03:2d:c3:ce:81:8e:74:bf:00:a1:
        f1:b2:54:69:64:6f:70:32:ba:65:9d:24:ea:1f:38:7f:
        7e:34:11:58:7d:7d:8d:da:98:29:96:37:13:65:11:ea:
        c6:2f:5c:ee:56:40:b7:d6:5a:a9:05:ec:9a:6c:6d:1d:
        ea:c4:34:4c:a9:4a:2c:d0:db:bd:99:91:58:0d:59:da:
        4f:d4:20:31:b6:92:ef:d1:bf:cb:bf:05:88:9c:41:c0:
        94:17:77:8d:08:a1:b2:4c:0d:96:6d:00:94:70:37:d4:
        a3:c6:2a:e3:4c:df:74:07:c8:d8:fa:69:ba:29:cb:25
    Fingerprint (SHA-256):
        3A:15:DF:C9:A5:85:D7:3B:1D:B6:96:32:CB:33:CF:0B:98:41:BA:A0:32:EE:E2:41:1A:E0:EE:04:7B:2B:BB:14
    Fingerprint (SHA1):
        E2:A4:75:51:1F:B0:52:45:48:93:01:88:34:05:D0:A2:92:87:7D:FC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3630: Method: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp   -g leaf -h requireFreshInfo -m ocsp     - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB    -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB  -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is good!
Returned value is 0, expected result is pass
chains.sh: #3631: Method: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB    -g leaf -h requireFreshInfo -m ocsp     - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p   -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB -p -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is good!
Returned value is 0, expected result is pass
chains.sh: #3632: Method: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p   -g leaf -h requireFreshInfo -m ocsp     - PASSED
trying to kill httpserv with PID 13787 at Fri May 19 18:53:55 UTC 2017
kill -USR1 13787
httpserv: normal termination
httpserv -b -p 8641 2>/dev/null;
httpserv with PID 13787 killed at Fri May 19 18:53:55 UTC 2017
httpserv starting at Fri May 19 18:53:55 UTC 2017
httpserv -D -p 8641  \
         -A OCSPRoot -C /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/OCSPCA1.crl \
         -A OCSPCA2  -C /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/OCSPCA2.crl  -A OCSPCA3 -C /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/OCSPCA3.crl \
         -O post -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/ServerDB/ -f /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/ServerDB/dbpasswd \
         -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/aiahttp/http_pid.8458  &
trying to connect to httpserv at Fri May 19 18:53:55 UTC 2017
tstclnt -p 8641 -h 127.0.0.1 -q -v
tstclnt: connecting to 127.0.0.1:8641 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13982 >/dev/null 2>/dev/null
httpserv with PID 13982 found at Fri May 19 18:53:55 UTC 2017
httpserv with PID 13982 started at Fri May 19 18:53:55 UTC 2017
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp   -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3633: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp   -g leaf -h requireFreshInfo -m ocsp     - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB    -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB  -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. OCSPEE12OCSPCA1 :
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3634: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB    -g leaf -h requireFreshInfo -m ocsp     - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p   -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB -p -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3635: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p   -g leaf -h requireFreshInfo -m ocsp     - PASSED
tstclnt -h 127.0.0.1 -p 8641 -q -t 20
chains.sh: #3636: Test that OCSP server is reachable - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp   -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185130 (0x1ef222ea)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Fri May 19 18:51:39 2017
            Not After : Thu May 19 18:51:39 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:54:eb:22:7b:de:a7:9e:e1:77:34:08:87:b3:00:63:
                    41:3b:c2:97:d0:9e:b2:bc:de:7e:f7:22:ae:b4:a8:fe:
                    db:bb:44:3a:6f:c1:ba:0f:8a:be:42:39:45:77:62:e9:
                    28:ce:1e:3e:0e:c2:e5:d2:bd:c7:7f:71:40:ab:67:36:
                    3c:9c:d4:11:ea:7b:8b:58:5d:2a:2e:81:bd:e4:89:ab:
                    ad:9c:23:3f:f9:ef:e7:bb:7b:89:21:75:fe:74:cc:7c:
                    9a:6a:48:5f:c2:0a:34:e8:86:80:cb:28:8e:24:45:71:
                    34:14:e8:0e:56:25:42:d8:cf:b7:71:df:d0:65:d8:eb:
                    67:89:24:4e:6e:0b:60:5e:9c:01:f0:18:42:e9:06:13:
                    11:41:70:05:6d:85:e9:fe:c1:96:67:f3:44:9d:ea:13:
                    b9:bd:85:ca:54:cb:a4:2a:bf:12:61:48:77:e7:3e:b5:
                    f2:d6:73:bf:22:d3:8c:c6:b5:7f:be:49:fb:55:f1:4d:
                    db:53:15:c7:66:d8:13:c3:01:25:56:11:19:e4:e8:2a:
                    b9:56:4d:11:0c:c0:bd:9e:da:79:b4:ed:57:78:40:57:
                    1c:43:67:00:60:1c:b7:60:4c:58:87:91:74:9a:23:bd:
                    aa:13:ce:ce:49:57:00:c4:55:e5:2e:9a:83:e8:df:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a0:ce:f5:c6:31:24:13:46:6f:1c:22:4f:09:e3:6f:f2:
        75:47:de:9a:6e:fa:d5:dc:22:29:37:7b:0c:91:36:75:
        a3:d8:d5:62:1b:65:5e:de:a7:3e:71:a7:96:61:5e:ef:
        5e:b3:0f:b6:a7:c3:93:c0:26:de:1f:cf:a8:f7:eb:94:
        61:fe:0d:c1:f6:ec:17:a7:30:6f:1a:5f:9e:33:28:a8:
        67:c5:c6:80:d0:41:18:7e:bf:06:4d:2a:9b:d3:a4:c4:
        c2:0a:15:c5:3b:f2:a4:65:9d:7f:53:0f:07:a8:b5:77:
        e0:65:42:5a:db:29:8f:36:c6:e1:54:1e:ca:2c:60:63:
        15:0c:e8:21:9c:fe:03:2d:c3:ce:81:8e:74:bf:00:a1:
        f1:b2:54:69:64:6f:70:32:ba:65:9d:24:ea:1f:38:7f:
        7e:34:11:58:7d:7d:8d:da:98:29:96:37:13:65:11:ea:
        c6:2f:5c:ee:56:40:b7:d6:5a:a9:05:ec:9a:6c:6d:1d:
        ea:c4:34:4c:a9:4a:2c:d0:db:bd:99:91:58:0d:59:da:
        4f:d4:20:31:b6:92:ef:d1:bf:cb:bf:05:88:9c:41:c0:
        94:17:77:8d:08:a1:b2:4c:0d:96:6d:00:94:70:37:d4:
        a3:c6:2a:e3:4c:df:74:07:c8:d8:fa:69:ba:29:cb:25
    Fingerprint (SHA-256):
        3A:15:DF:C9:A5:85:D7:3B:1D:B6:96:32:CB:33:CF:0B:98:41:BA:A0:32:EE:E2:41:1A:E0:EE:04:7B:2B:BB:14
    Fingerprint (SHA1):
        E2:A4:75:51:1F:B0:52:45:48:93:01:88:34:05:D0:A2:92:87:7D:FC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3637: Method: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp   -g leaf -h requireFreshInfo -m ocsp     - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB    -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB  -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is good!
Returned value is 0, expected result is pass
chains.sh: #3638: Method: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB    -g leaf -h requireFreshInfo -m ocsp     - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p   -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB -p -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is good!
Returned value is 0, expected result is pass
chains.sh: #3639: Method: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p   -g leaf -h requireFreshInfo -m ocsp     - PASSED
trying to kill httpserv with PID 13982 at Fri May 19 18:53:57 UTC 2017
kill -USR1 13982
httpserv: normal termination
httpserv -b -p 8641 2>/dev/null;
httpserv with PID 13982 killed at Fri May 19 18:53:57 UTC 2017
httpserv starting at Fri May 19 18:53:58 UTC 2017
httpserv -D -p 8641  \
         -A OCSPRoot -C /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/OCSPCA1.crl \
         -A OCSPCA2  -C /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/OCSPCA2.crl  -A OCSPCA3 -C /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/OCSPCA3.crl \
         -O random -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/ServerDB/ -f /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/ServerDB/dbpasswd \
         -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/aiahttp/http_pid.8458  &
trying to connect to httpserv at Fri May 19 18:53:58 UTC 2017
tstclnt -p 8641 -h 127.0.0.1 -q -v
tstclnt: connecting to 127.0.0.1:8641 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14256 >/dev/null 2>/dev/null
httpserv with PID 14256 found at Fri May 19 18:53:58 UTC 2017
httpserv with PID 14256 started at Fri May 19 18:53:58 UTC 2017
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp   -g leaf -h requireFreshInfo -m ocsp    
vfychain -d ../OCSPD/ClientDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3640: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp   -g leaf -h requireFreshInfo -m ocsp     - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #3641: Bridge: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185131 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3642: Bridge: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #3643: Bridge: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #3644: Bridge: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185132 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3645: Bridge: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #3646: Bridge: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #3647: Bridge: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3648: Bridge: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 519185133 -7 Bridge@Army  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #3649: Bridge: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3650: Bridge: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 519185134 -7 Bridge@Navy  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #3651: Bridge: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3652: Bridge: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #3653: Bridge: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3654: Bridge: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3655: Bridge: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserBridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 519185135   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #3656: Bridge: Creating certficate UserBridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate UserBridge.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3657: Bridge: Importing certificate UserBridge.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3658: Bridge: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Army.der to AllDB database
certutil -A -n Army  -t "" -d AllDB -f AllDB/dbpasswd -i Army.der
chains.sh: #3659: Bridge: Importing certificate Army.der to AllDB database  - PASSED
chains.sh: Importing certificate Navy.der to AllDB database
certutil -A -n Navy  -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der
chains.sh: #3660: Bridge: Importing certificate Navy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d AllDB -pp       -t Navy
vfychain -d AllDB -pp -vv       UserBridge.der BridgeNavy.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185132 (0x1ef222ec)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 18:54:15 2017
            Not After : Thu May 19 18:54:15 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:41:45:be:18:e8:53:70:c8:08:a6:e7:dd:e3:f8:b6:
                    e0:51:0f:15:e0:1c:cc:17:01:dd:90:82:4d:a3:2f:ed:
                    66:95:f7:b2:77:e5:63:d0:81:bd:88:ca:41:db:98:9e:
                    aa:66:5d:cc:64:bb:d4:4e:f6:72:1c:93:83:59:e9:18:
                    32:52:cd:c5:2c:2e:4b:8a:4b:5c:63:d9:70:6b:92:58:
                    21:79:13:65:8e:34:09:3a:2f:3f:9d:c2:30:46:16:1e:
                    55:ec:00:32:9e:9a:00:8d:b5:65:89:c3:24:7b:d0:41:
                    30:49:04:f2:b9:2f:78:44:62:7b:a3:28:70:40:b1:68:
                    eb:80:d3:14:c3:fa:a0:4e:91:09:35:1a:7a:c9:d8:08:
                    08:f6:07:ae:b3:0f:1e:48:f6:40:fb:f6:1e:cb:a9:25:
                    19:2f:4b:43:c6:b6:51:8a:3b:bc:ae:27:1c:c6:84:18:
                    b1:54:6f:29:c3:eb:c5:73:3f:8b:a1:e8:c7:ed:be:d1:
                    2f:29:bd:43:6f:0e:64:78:2f:d9:49:1f:ab:e3:27:ca:
                    ad:cc:d1:bc:30:ee:b0:cc:9d:0e:c4:65:fe:53:b5:27:
                    f7:d6:2f:d9:20:37:7b:bd:ea:8b:7a:c9:8e:a2:f3:f8:
                    a7:03:2d:3d:01:84:d7:9c:48:3a:9c:02:5b:4c:68:47
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        11:73:25:b0:01:cb:3f:cf:54:71:28:6f:5b:1c:68:26:
        04:40:b8:e8:06:89:3b:7c:a2:42:27:f2:bb:5c:64:b3:
        5c:5b:d0:b8:73:6f:c2:6c:02:86:c1:3a:af:3d:cd:b8:
        9b:4a:bf:86:90:68:67:f6:9e:13:6a:f4:e3:22:7f:69:
        e5:ca:30:cc:87:b0:27:d1:a9:9c:c3:03:8f:47:5d:44:
        7c:5a:9a:07:fc:29:89:77:11:c3:b1:83:63:5a:3e:6d:
        28:12:66:c2:5e:45:03:16:84:d4:92:0d:ec:20:92:79:
        d6:45:a9:14:38:a8:66:be:06:39:20:fc:b2:93:6f:3d:
        91:f5:88:58:03:10:63:73:10:82:85:29:d4:e1:92:b5:
        7e:9b:f8:41:da:67:df:11:4a:c2:09:0e:43:0b:5f:c1:
        fa:13:68:97:19:c6:3c:b5:9a:74:0e:ee:98:5e:00:71:
        1c:97:eb:b6:60:28:db:5b:21:b3:15:d5:5a:93:a2:58:
        44:03:af:92:cb:5b:b7:94:42:f3:ec:46:29:77:af:01:
        f0:6f:ea:52:7c:30:47:97:bc:49:ff:86:80:9d:ff:5b:
        dc:7f:92:f0:e4:4f:0a:98:cd:40:a7:73:87:db:45:8d:
        66:d7:77:22:cc:9b:98:bf:21:8e:8d:cf:81:c5:13:5d
    Fingerprint (SHA-256):
        9C:24:E2:78:7A:84:12:51:E5:52:BA:42:67:8C:DB:85:77:EB:8F:1A:C9:AD:D9:FB:45:17:56:41:A7:DE:02:CD
    Fingerprint (SHA1):
        21:7D:98:9C:BB:6F:51:D4:88:3B:EC:BA:64:E1:55:79:4B:64:0A:8C

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3661: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d AllDB -pp       -t Navy - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d AllDB -pp       -t Army
vfychain -d AllDB -pp -vv       UserBridge.der BridgeArmy.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185131 (0x1ef222eb)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Fri May 19 18:54:08 2017
            Not After : Thu May 19 18:54:08 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ab:50:0f:9a:e4:a2:66:b8:a3:cd:28:98:b5:25:00:5c:
                    a8:52:84:9e:0c:51:ee:4f:86:f7:89:ce:c5:eb:95:06:
                    db:86:d6:48:13:7f:ba:14:ac:d6:07:69:a4:3a:13:52:
                    0c:48:86:70:43:af:fb:b6:d2:e9:f0:77:1f:d1:90:1c:
                    9a:e9:75:6b:36:ae:9c:1d:7f:e2:41:e8:64:d3:db:4c:
                    2c:7a:73:59:ba:42:b0:fb:35:68:83:e2:24:15:60:d4:
                    ca:49:e8:e2:5f:d6:6c:c6:a4:66:bb:61:dd:f9:8a:7f:
                    1e:b9:c8:65:04:e8:ad:8d:d7:c4:69:34:87:40:4e:d1:
                    12:7b:a0:a0:b1:14:4d:20:4c:64:e8:1d:85:da:7c:c8:
                    bf:08:dc:7f:5c:5b:d9:e9:40:1f:5d:a3:61:7c:6b:7b:
                    7f:f1:fa:67:d4:1e:d0:26:6e:c1:84:4e:5e:7e:37:2d:
                    22:e2:74:d9:ca:69:b5:29:80:bf:b1:11:92:50:b2:70:
                    bc:ef:f8:b9:02:2e:22:71:af:14:af:09:ba:b0:a7:ce:
                    cb:36:6e:e9:5d:d4:d0:31:30:01:3b:c5:e6:63:2e:11:
                    1e:1c:e5:f7:61:d4:a1:ee:7d:5f:9e:b2:61:ad:1d:f9:
                    79:5f:90:f2:09:9c:cd:b2:9d:e6:df:17:7f:69:be:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        65:17:b7:6f:e9:be:82:87:d5:e1:e4:fe:8e:00:dc:b1:
        8c:f2:0a:a9:88:23:35:22:00:cc:a7:7f:fd:65:68:14:
        18:a5:3f:05:a9:ea:63:12:6d:de:ab:fa:20:f2:d7:c2:
        2c:96:f7:7a:d7:f5:00:a2:e0:29:4f:4d:57:72:db:be:
        b4:e4:7e:99:9b:5f:ea:84:52:58:f5:d9:bd:9e:64:fb:
        45:c3:79:b4:60:87:60:a1:4a:2f:1f:b4:d0:41:8e:dc:
        12:21:e5:57:ca:81:f5:c8:ff:c4:22:b1:c8:83:8e:54:
        d4:86:6f:ee:bf:8d:02:df:dd:e8:de:02:44:88:8e:57:
        d8:a8:58:92:d2:59:55:ec:6d:e8:a2:89:d4:6a:39:6c:
        55:d4:9e:71:fe:bc:d7:fc:f5:e1:f0:70:0a:d3:5f:81:
        c8:ca:54:5b:f6:9a:a4:37:d1:f3:b8:4a:a1:f4:7c:a1:
        4d:d7:96:2c:0a:5b:3b:82:85:ef:e2:e5:74:da:76:93:
        6e:2d:96:44:37:04:e4:fc:1a:3d:fe:f0:0e:9c:d9:89:
        98:4c:06:96:6b:45:c8:d3:a0:de:d5:98:c1:53:f8:2f:
        ce:15:1c:1b:de:20:2e:66:55:b8:9c:1a:80:ec:1c:99:
        ee:f8:66:e6:e3:c7:05:0d:10:28:31:80:6d:44:82:25
    Fingerprint (SHA-256):
        DB:74:E0:BD:29:C4:DE:52:94:0D:02:11:AB:A9:A6:77:C4:E7:43:8C:30:ED:41:C0:D0:05:02:1D:CD:DC:C4:E2
    Fingerprint (SHA1):
        10:B2:9A:49:55:14:DB:C5:19:96:27:3D:38:47:AD:65:7E:1B:0F:1B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3662: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d AllDB -pp       -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d AllDB -pp       -t Army
vfychain -d AllDB -pp -vv       UserBridge.der BridgeNavy.der  -t Army
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Navy [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3663: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d AllDB -pp       -t Army - PASSED
chains.sh: Importing certificate BridgeArmy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der
chains.sh: #3664: Bridge: Importing certificate BridgeArmy.der to AllDB database  - PASSED
chains.sh: Importing certificate BridgeNavy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der
chains.sh: #3665: Bridge: Importing certificate BridgeNavy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags -d AllDB -pp       -t Army
vfychain -d AllDB -pp -vv       UserBridge.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185131 (0x1ef222eb)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Fri May 19 18:54:08 2017
            Not After : Thu May 19 18:54:08 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ab:50:0f:9a:e4:a2:66:b8:a3:cd:28:98:b5:25:00:5c:
                    a8:52:84:9e:0c:51:ee:4f:86:f7:89:ce:c5:eb:95:06:
                    db:86:d6:48:13:7f:ba:14:ac:d6:07:69:a4:3a:13:52:
                    0c:48:86:70:43:af:fb:b6:d2:e9:f0:77:1f:d1:90:1c:
                    9a:e9:75:6b:36:ae:9c:1d:7f:e2:41:e8:64:d3:db:4c:
                    2c:7a:73:59:ba:42:b0:fb:35:68:83:e2:24:15:60:d4:
                    ca:49:e8:e2:5f:d6:6c:c6:a4:66:bb:61:dd:f9:8a:7f:
                    1e:b9:c8:65:04:e8:ad:8d:d7:c4:69:34:87:40:4e:d1:
                    12:7b:a0:a0:b1:14:4d:20:4c:64:e8:1d:85:da:7c:c8:
                    bf:08:dc:7f:5c:5b:d9:e9:40:1f:5d:a3:61:7c:6b:7b:
                    7f:f1:fa:67:d4:1e:d0:26:6e:c1:84:4e:5e:7e:37:2d:
                    22:e2:74:d9:ca:69:b5:29:80:bf:b1:11:92:50:b2:70:
                    bc:ef:f8:b9:02:2e:22:71:af:14:af:09:ba:b0:a7:ce:
                    cb:36:6e:e9:5d:d4:d0:31:30:01:3b:c5:e6:63:2e:11:
                    1e:1c:e5:f7:61:d4:a1:ee:7d:5f:9e:b2:61:ad:1d:f9:
                    79:5f:90:f2:09:9c:cd:b2:9d:e6:df:17:7f:69:be:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        65:17:b7:6f:e9:be:82:87:d5:e1:e4:fe:8e:00:dc:b1:
        8c:f2:0a:a9:88:23:35:22:00:cc:a7:7f:fd:65:68:14:
        18:a5:3f:05:a9:ea:63:12:6d:de:ab:fa:20:f2:d7:c2:
        2c:96:f7:7a:d7:f5:00:a2:e0:29:4f:4d:57:72:db:be:
        b4:e4:7e:99:9b:5f:ea:84:52:58:f5:d9:bd:9e:64:fb:
        45:c3:79:b4:60:87:60:a1:4a:2f:1f:b4:d0:41:8e:dc:
        12:21:e5:57:ca:81:f5:c8:ff:c4:22:b1:c8:83:8e:54:
        d4:86:6f:ee:bf:8d:02:df:dd:e8:de:02:44:88:8e:57:
        d8:a8:58:92:d2:59:55:ec:6d:e8:a2:89:d4:6a:39:6c:
        55:d4:9e:71:fe:bc:d7:fc:f5:e1:f0:70:0a:d3:5f:81:
        c8:ca:54:5b:f6:9a:a4:37:d1:f3:b8:4a:a1:f4:7c:a1:
        4d:d7:96:2c:0a:5b:3b:82:85:ef:e2:e5:74:da:76:93:
        6e:2d:96:44:37:04:e4:fc:1a:3d:fe:f0:0e:9c:d9:89:
        98:4c:06:96:6b:45:c8:d3:a0:de:d5:98:c1:53:f8:2f:
        ce:15:1c:1b:de:20:2e:66:55:b8:9c:1a:80:ec:1c:99:
        ee:f8:66:e6:e3:c7:05:0d:10:28:31:80:6d:44:82:25
    Fingerprint (SHA-256):
        DB:74:E0:BD:29:C4:DE:52:94:0D:02:11:AB:A9:A6:77:C4:E7:43:8C:30:ED:41:C0:D0:05:02:1D:CD:DC:C4:E2
    Fingerprint (SHA1):
        10:B2:9A:49:55:14:DB:C5:19:96:27:3D:38:47:AD:65:7E:1B:0F:1B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3666: Bridge: Verifying certificate(s)  UserBridge.der with flags -d AllDB -pp       -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags -d AllDB -pp       -t Navy
vfychain -d AllDB -pp -vv       UserBridge.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185132 (0x1ef222ec)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 18:54:15 2017
            Not After : Thu May 19 18:54:15 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:41:45:be:18:e8:53:70:c8:08:a6:e7:dd:e3:f8:b6:
                    e0:51:0f:15:e0:1c:cc:17:01:dd:90:82:4d:a3:2f:ed:
                    66:95:f7:b2:77:e5:63:d0:81:bd:88:ca:41:db:98:9e:
                    aa:66:5d:cc:64:bb:d4:4e:f6:72:1c:93:83:59:e9:18:
                    32:52:cd:c5:2c:2e:4b:8a:4b:5c:63:d9:70:6b:92:58:
                    21:79:13:65:8e:34:09:3a:2f:3f:9d:c2:30:46:16:1e:
                    55:ec:00:32:9e:9a:00:8d:b5:65:89:c3:24:7b:d0:41:
                    30:49:04:f2:b9:2f:78:44:62:7b:a3:28:70:40:b1:68:
                    eb:80:d3:14:c3:fa:a0:4e:91:09:35:1a:7a:c9:d8:08:
                    08:f6:07:ae:b3:0f:1e:48:f6:40:fb:f6:1e:cb:a9:25:
                    19:2f:4b:43:c6:b6:51:8a:3b:bc:ae:27:1c:c6:84:18:
                    b1:54:6f:29:c3:eb:c5:73:3f:8b:a1:e8:c7:ed:be:d1:
                    2f:29:bd:43:6f:0e:64:78:2f:d9:49:1f:ab:e3:27:ca:
                    ad:cc:d1:bc:30:ee:b0:cc:9d:0e:c4:65:fe:53:b5:27:
                    f7:d6:2f:d9:20:37:7b:bd:ea:8b:7a:c9:8e:a2:f3:f8:
                    a7:03:2d:3d:01:84:d7:9c:48:3a:9c:02:5b:4c:68:47
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        11:73:25:b0:01:cb:3f:cf:54:71:28:6f:5b:1c:68:26:
        04:40:b8:e8:06:89:3b:7c:a2:42:27:f2:bb:5c:64:b3:
        5c:5b:d0:b8:73:6f:c2:6c:02:86:c1:3a:af:3d:cd:b8:
        9b:4a:bf:86:90:68:67:f6:9e:13:6a:f4:e3:22:7f:69:
        e5:ca:30:cc:87:b0:27:d1:a9:9c:c3:03:8f:47:5d:44:
        7c:5a:9a:07:fc:29:89:77:11:c3:b1:83:63:5a:3e:6d:
        28:12:66:c2:5e:45:03:16:84:d4:92:0d:ec:20:92:79:
        d6:45:a9:14:38:a8:66:be:06:39:20:fc:b2:93:6f:3d:
        91:f5:88:58:03:10:63:73:10:82:85:29:d4:e1:92:b5:
        7e:9b:f8:41:da:67:df:11:4a:c2:09:0e:43:0b:5f:c1:
        fa:13:68:97:19:c6:3c:b5:9a:74:0e:ee:98:5e:00:71:
        1c:97:eb:b6:60:28:db:5b:21:b3:15:d5:5a:93:a2:58:
        44:03:af:92:cb:5b:b7:94:42:f3:ec:46:29:77:af:01:
        f0:6f:ea:52:7c:30:47:97:bc:49:ff:86:80:9d:ff:5b:
        dc:7f:92:f0:e4:4f:0a:98:cd:40:a7:73:87:db:45:8d:
        66:d7:77:22:cc:9b:98:bf:21:8e:8d:cf:81:c5:13:5d
    Fingerprint (SHA-256):
        9C:24:E2:78:7A:84:12:51:E5:52:BA:42:67:8C:DB:85:77:EB:8F:1A:C9:AD:D9:FB:45:17:56:41:A7:DE:02:CD
    Fingerprint (SHA1):
        21:7D:98:9C:BB:6F:51:D4:88:3B:EC:BA:64:E1:55:79:4B:64:0A:8C

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3667: Bridge: Verifying certificate(s)  UserBridge.der with flags -d AllDB -pp       -t Navy - PASSED
chains.sh: Creating DB ArmyOnlyDB
certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd
chains.sh: #3668: Bridge: Creating DB ArmyOnlyDB  - PASSED
chains.sh: Importing certificate Army.der to ArmyOnlyDB database
certutil -A -n Army  -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der
chains.sh: #3669: Bridge: Importing certificate Army.der to ArmyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags -d ArmyOnlyDB -pp      
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3670: Bridge: Verifying certificate(s)  UserBridge.der with flags -d ArmyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp      
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3671: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp      
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der Navy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3672: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp       -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der Navy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185132 (0x1ef222ec)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 18:54:15 2017
            Not After : Thu May 19 18:54:15 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:41:45:be:18:e8:53:70:c8:08:a6:e7:dd:e3:f8:b6:
                    e0:51:0f:15:e0:1c:cc:17:01:dd:90:82:4d:a3:2f:ed:
                    66:95:f7:b2:77:e5:63:d0:81:bd:88:ca:41:db:98:9e:
                    aa:66:5d:cc:64:bb:d4:4e:f6:72:1c:93:83:59:e9:18:
                    32:52:cd:c5:2c:2e:4b:8a:4b:5c:63:d9:70:6b:92:58:
                    21:79:13:65:8e:34:09:3a:2f:3f:9d:c2:30:46:16:1e:
                    55:ec:00:32:9e:9a:00:8d:b5:65:89:c3:24:7b:d0:41:
                    30:49:04:f2:b9:2f:78:44:62:7b:a3:28:70:40:b1:68:
                    eb:80:d3:14:c3:fa:a0:4e:91:09:35:1a:7a:c9:d8:08:
                    08:f6:07:ae:b3:0f:1e:48:f6:40:fb:f6:1e:cb:a9:25:
                    19:2f:4b:43:c6:b6:51:8a:3b:bc:ae:27:1c:c6:84:18:
                    b1:54:6f:29:c3:eb:c5:73:3f:8b:a1:e8:c7:ed:be:d1:
                    2f:29:bd:43:6f:0e:64:78:2f:d9:49:1f:ab:e3:27:ca:
                    ad:cc:d1:bc:30:ee:b0:cc:9d:0e:c4:65:fe:53:b5:27:
                    f7:d6:2f:d9:20:37:7b:bd:ea:8b:7a:c9:8e:a2:f3:f8:
                    a7:03:2d:3d:01:84:d7:9c:48:3a:9c:02:5b:4c:68:47
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        11:73:25:b0:01:cb:3f:cf:54:71:28:6f:5b:1c:68:26:
        04:40:b8:e8:06:89:3b:7c:a2:42:27:f2:bb:5c:64:b3:
        5c:5b:d0:b8:73:6f:c2:6c:02:86:c1:3a:af:3d:cd:b8:
        9b:4a:bf:86:90:68:67:f6:9e:13:6a:f4:e3:22:7f:69:
        e5:ca:30:cc:87:b0:27:d1:a9:9c:c3:03:8f:47:5d:44:
        7c:5a:9a:07:fc:29:89:77:11:c3:b1:83:63:5a:3e:6d:
        28:12:66:c2:5e:45:03:16:84:d4:92:0d:ec:20:92:79:
        d6:45:a9:14:38:a8:66:be:06:39:20:fc:b2:93:6f:3d:
        91:f5:88:58:03:10:63:73:10:82:85:29:d4:e1:92:b5:
        7e:9b:f8:41:da:67:df:11:4a:c2:09:0e:43:0b:5f:c1:
        fa:13:68:97:19:c6:3c:b5:9a:74:0e:ee:98:5e:00:71:
        1c:97:eb:b6:60:28:db:5b:21:b3:15:d5:5a:93:a2:58:
        44:03:af:92:cb:5b:b7:94:42:f3:ec:46:29:77:af:01:
        f0:6f:ea:52:7c:30:47:97:bc:49:ff:86:80:9d:ff:5b:
        dc:7f:92:f0:e4:4f:0a:98:cd:40:a7:73:87:db:45:8d:
        66:d7:77:22:cc:9b:98:bf:21:8e:8d:cf:81:c5:13:5d
    Fingerprint (SHA-256):
        9C:24:E2:78:7A:84:12:51:E5:52:BA:42:67:8C:DB:85:77:EB:8F:1A:C9:AD:D9:FB:45:17:56:41:A7:DE:02:CD
    Fingerprint (SHA1):
        21:7D:98:9C:BB:6F:51:D4:88:3B:EC:BA:64:E1:55:79:4B:64:0A:8C


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3673: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp       -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp       -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185132 (0x1ef222ec)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 18:54:15 2017
            Not After : Thu May 19 18:54:15 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:41:45:be:18:e8:53:70:c8:08:a6:e7:dd:e3:f8:b6:
                    e0:51:0f:15:e0:1c:cc:17:01:dd:90:82:4d:a3:2f:ed:
                    66:95:f7:b2:77:e5:63:d0:81:bd:88:ca:41:db:98:9e:
                    aa:66:5d:cc:64:bb:d4:4e:f6:72:1c:93:83:59:e9:18:
                    32:52:cd:c5:2c:2e:4b:8a:4b:5c:63:d9:70:6b:92:58:
                    21:79:13:65:8e:34:09:3a:2f:3f:9d:c2:30:46:16:1e:
                    55:ec:00:32:9e:9a:00:8d:b5:65:89:c3:24:7b:d0:41:
                    30:49:04:f2:b9:2f:78:44:62:7b:a3:28:70:40:b1:68:
                    eb:80:d3:14:c3:fa:a0:4e:91:09:35:1a:7a:c9:d8:08:
                    08:f6:07:ae:b3:0f:1e:48:f6:40:fb:f6:1e:cb:a9:25:
                    19:2f:4b:43:c6:b6:51:8a:3b:bc:ae:27:1c:c6:84:18:
                    b1:54:6f:29:c3:eb:c5:73:3f:8b:a1:e8:c7:ed:be:d1:
                    2f:29:bd:43:6f:0e:64:78:2f:d9:49:1f:ab:e3:27:ca:
                    ad:cc:d1:bc:30:ee:b0:cc:9d:0e:c4:65:fe:53:b5:27:
                    f7:d6:2f:d9:20:37:7b:bd:ea:8b:7a:c9:8e:a2:f3:f8:
                    a7:03:2d:3d:01:84:d7:9c:48:3a:9c:02:5b:4c:68:47
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        11:73:25:b0:01:cb:3f:cf:54:71:28:6f:5b:1c:68:26:
        04:40:b8:e8:06:89:3b:7c:a2:42:27:f2:bb:5c:64:b3:
        5c:5b:d0:b8:73:6f:c2:6c:02:86:c1:3a:af:3d:cd:b8:
        9b:4a:bf:86:90:68:67:f6:9e:13:6a:f4:e3:22:7f:69:
        e5:ca:30:cc:87:b0:27:d1:a9:9c:c3:03:8f:47:5d:44:
        7c:5a:9a:07:fc:29:89:77:11:c3:b1:83:63:5a:3e:6d:
        28:12:66:c2:5e:45:03:16:84:d4:92:0d:ec:20:92:79:
        d6:45:a9:14:38:a8:66:be:06:39:20:fc:b2:93:6f:3d:
        91:f5:88:58:03:10:63:73:10:82:85:29:d4:e1:92:b5:
        7e:9b:f8:41:da:67:df:11:4a:c2:09:0e:43:0b:5f:c1:
        fa:13:68:97:19:c6:3c:b5:9a:74:0e:ee:98:5e:00:71:
        1c:97:eb:b6:60:28:db:5b:21:b3:15:d5:5a:93:a2:58:
        44:03:af:92:cb:5b:b7:94:42:f3:ec:46:29:77:af:01:
        f0:6f:ea:52:7c:30:47:97:bc:49:ff:86:80:9d:ff:5b:
        dc:7f:92:f0:e4:4f:0a:98:cd:40:a7:73:87:db:45:8d:
        66:d7:77:22:cc:9b:98:bf:21:8e:8d:cf:81:c5:13:5d
    Fingerprint (SHA-256):
        9C:24:E2:78:7A:84:12:51:E5:52:BA:42:67:8C:DB:85:77:EB:8F:1A:C9:AD:D9:FB:45:17:56:41:A7:DE:02:CD
    Fingerprint (SHA1):
        21:7D:98:9C:BB:6F:51:D4:88:3B:EC:BA:64:E1:55:79:4B:64:0A:8C


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3674: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp       -t Navy.der - PASSED
chains.sh: Creating DB NavyOnlyDB
certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd
chains.sh: #3675: Bridge: Creating DB NavyOnlyDB  - PASSED
chains.sh: Importing certificate Navy.der to NavyOnlyDB database
certutil -A -n Navy  -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der
chains.sh: #3676: Bridge: Importing certificate Navy.der to NavyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags -d NavyOnlyDB -pp      
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3677: Bridge: Verifying certificate(s)  UserBridge.der with flags -d NavyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp      
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #3678: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp      
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der Army.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #3679: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp       -t Army.der
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der Army.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185131 (0x1ef222eb)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Fri May 19 18:54:08 2017
            Not After : Thu May 19 18:54:08 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ab:50:0f:9a:e4:a2:66:b8:a3:cd:28:98:b5:25:00:5c:
                    a8:52:84:9e:0c:51:ee:4f:86:f7:89:ce:c5:eb:95:06:
                    db:86:d6:48:13:7f:ba:14:ac:d6:07:69:a4:3a:13:52:
                    0c:48:86:70:43:af:fb:b6:d2:e9:f0:77:1f:d1:90:1c:
                    9a:e9:75:6b:36:ae:9c:1d:7f:e2:41:e8:64:d3:db:4c:
                    2c:7a:73:59:ba:42:b0:fb:35:68:83:e2:24:15:60:d4:
                    ca:49:e8:e2:5f:d6:6c:c6:a4:66:bb:61:dd:f9:8a:7f:
                    1e:b9:c8:65:04:e8:ad:8d:d7:c4:69:34:87:40:4e:d1:
                    12:7b:a0:a0:b1:14:4d:20:4c:64:e8:1d:85:da:7c:c8:
                    bf:08:dc:7f:5c:5b:d9:e9:40:1f:5d:a3:61:7c:6b:7b:
                    7f:f1:fa:67:d4:1e:d0:26:6e:c1:84:4e:5e:7e:37:2d:
                    22:e2:74:d9:ca:69:b5:29:80:bf:b1:11:92:50:b2:70:
                    bc:ef:f8:b9:02:2e:22:71:af:14:af:09:ba:b0:a7:ce:
                    cb:36:6e:e9:5d:d4:d0:31:30:01:3b:c5:e6:63:2e:11:
                    1e:1c:e5:f7:61:d4:a1:ee:7d:5f:9e:b2:61:ad:1d:f9:
                    79:5f:90:f2:09:9c:cd:b2:9d:e6:df:17:7f:69:be:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        65:17:b7:6f:e9:be:82:87:d5:e1:e4:fe:8e:00:dc:b1:
        8c:f2:0a:a9:88:23:35:22:00:cc:a7:7f:fd:65:68:14:
        18:a5:3f:05:a9:ea:63:12:6d:de:ab:fa:20:f2:d7:c2:
        2c:96:f7:7a:d7:f5:00:a2:e0:29:4f:4d:57:72:db:be:
        b4:e4:7e:99:9b:5f:ea:84:52:58:f5:d9:bd:9e:64:fb:
        45:c3:79:b4:60:87:60:a1:4a:2f:1f:b4:d0:41:8e:dc:
        12:21:e5:57:ca:81:f5:c8:ff:c4:22:b1:c8:83:8e:54:
        d4:86:6f:ee:bf:8d:02:df:dd:e8:de:02:44:88:8e:57:
        d8:a8:58:92:d2:59:55:ec:6d:e8:a2:89:d4:6a:39:6c:
        55:d4:9e:71:fe:bc:d7:fc:f5:e1:f0:70:0a:d3:5f:81:
        c8:ca:54:5b:f6:9a:a4:37:d1:f3:b8:4a:a1:f4:7c:a1:
        4d:d7:96:2c:0a:5b:3b:82:85:ef:e2:e5:74:da:76:93:
        6e:2d:96:44:37:04:e4:fc:1a:3d:fe:f0:0e:9c:d9:89:
        98:4c:06:96:6b:45:c8:d3:a0:de:d5:98:c1:53:f8:2f:
        ce:15:1c:1b:de:20:2e:66:55:b8:9c:1a:80:ec:1c:99:
        ee:f8:66:e6:e3:c7:05:0d:10:28:31:80:6d:44:82:25
    Fingerprint (SHA-256):
        DB:74:E0:BD:29:C4:DE:52:94:0D:02:11:AB:A9:A6:77:C4:E7:43:8C:30:ED:41:C0:D0:05:02:1D:CD:DC:C4:E2
    Fingerprint (SHA1):
        10:B2:9A:49:55:14:DB:C5:19:96:27:3D:38:47:AD:65:7E:1B:0F:1B


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3680: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp       -t Army.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp       -t Army.der
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185131 (0x1ef222eb)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Fri May 19 18:54:08 2017
            Not After : Thu May 19 18:54:08 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ab:50:0f:9a:e4:a2:66:b8:a3:cd:28:98:b5:25:00:5c:
                    a8:52:84:9e:0c:51:ee:4f:86:f7:89:ce:c5:eb:95:06:
                    db:86:d6:48:13:7f:ba:14:ac:d6:07:69:a4:3a:13:52:
                    0c:48:86:70:43:af:fb:b6:d2:e9:f0:77:1f:d1:90:1c:
                    9a:e9:75:6b:36:ae:9c:1d:7f:e2:41:e8:64:d3:db:4c:
                    2c:7a:73:59:ba:42:b0:fb:35:68:83:e2:24:15:60:d4:
                    ca:49:e8:e2:5f:d6:6c:c6:a4:66:bb:61:dd:f9:8a:7f:
                    1e:b9:c8:65:04:e8:ad:8d:d7:c4:69:34:87:40:4e:d1:
                    12:7b:a0:a0:b1:14:4d:20:4c:64:e8:1d:85:da:7c:c8:
                    bf:08:dc:7f:5c:5b:d9:e9:40:1f:5d:a3:61:7c:6b:7b:
                    7f:f1:fa:67:d4:1e:d0:26:6e:c1:84:4e:5e:7e:37:2d:
                    22:e2:74:d9:ca:69:b5:29:80:bf:b1:11:92:50:b2:70:
                    bc:ef:f8:b9:02:2e:22:71:af:14:af:09:ba:b0:a7:ce:
                    cb:36:6e:e9:5d:d4:d0:31:30:01:3b:c5:e6:63:2e:11:
                    1e:1c:e5:f7:61:d4:a1:ee:7d:5f:9e:b2:61:ad:1d:f9:
                    79:5f:90:f2:09:9c:cd:b2:9d:e6:df:17:7f:69:be:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        65:17:b7:6f:e9:be:82:87:d5:e1:e4:fe:8e:00:dc:b1:
        8c:f2:0a:a9:88:23:35:22:00:cc:a7:7f:fd:65:68:14:
        18:a5:3f:05:a9:ea:63:12:6d:de:ab:fa:20:f2:d7:c2:
        2c:96:f7:7a:d7:f5:00:a2:e0:29:4f:4d:57:72:db:be:
        b4:e4:7e:99:9b:5f:ea:84:52:58:f5:d9:bd:9e:64:fb:
        45:c3:79:b4:60:87:60:a1:4a:2f:1f:b4:d0:41:8e:dc:
        12:21:e5:57:ca:81:f5:c8:ff:c4:22:b1:c8:83:8e:54:
        d4:86:6f:ee:bf:8d:02:df:dd:e8:de:02:44:88:8e:57:
        d8:a8:58:92:d2:59:55:ec:6d:e8:a2:89:d4:6a:39:6c:
        55:d4:9e:71:fe:bc:d7:fc:f5:e1:f0:70:0a:d3:5f:81:
        c8:ca:54:5b:f6:9a:a4:37:d1:f3:b8:4a:a1:f4:7c:a1:
        4d:d7:96:2c:0a:5b:3b:82:85:ef:e2:e5:74:da:76:93:
        6e:2d:96:44:37:04:e4:fc:1a:3d:fe:f0:0e:9c:d9:89:
        98:4c:06:96:6b:45:c8:d3:a0:de:d5:98:c1:53:f8:2f:
        ce:15:1c:1b:de:20:2e:66:55:b8:9c:1a:80:ec:1c:99:
        ee:f8:66:e6:e3:c7:05:0d:10:28:31:80:6d:44:82:25
    Fingerprint (SHA-256):
        DB:74:E0:BD:29:C4:DE:52:94:0D:02:11:AB:A9:A6:77:C4:E7:43:8C:30:ED:41:C0:D0:05:02:1D:CD:DC:C4:E2
    Fingerprint (SHA1):
        10:B2:9A:49:55:14:DB:C5:19:96:27:3D:38:47:AD:65:7E:1B:0F:1B


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3681: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp       -t Army.der - PASSED
chains.sh: Creating DB Root1DB
certutil -N -d Root1DB -f Root1DB/dbpasswd
chains.sh: #3682: MegaBridge_3_2: Creating DB Root1DB  - PASSED
chains.sh: Creating Root CA Root1
certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1  -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185136 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3683: MegaBridge_3_2: Creating Root CA Root1  - PASSED
chains.sh: Exporting Root CA Root1.der
certutil -L -d Root1DB -r -n Root1 -o Root1.der
chains.sh: #3684: MegaBridge_3_2: Exporting Root CA Root1.der  - PASSED
chains.sh: Creating DB Root2DB
certutil -N -d Root2DB -f Root2DB/dbpasswd
chains.sh: #3685: MegaBridge_3_2: Creating DB Root2DB  - PASSED
chains.sh: Creating Root CA Root2
certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2  -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185137 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3686: MegaBridge_3_2: Creating Root CA Root2  - PASSED
chains.sh: Exporting Root CA Root2.der
certutil -L -d Root2DB -r -n Root2 -o Root2.der
chains.sh: #3687: MegaBridge_3_2: Exporting Root CA Root2.der  - PASSED
chains.sh: Creating DB Root3DB
certutil -N -d Root3DB -f Root3DB/dbpasswd
chains.sh: #3688: MegaBridge_3_2: Creating DB Root3DB  - PASSED
chains.sh: Creating Root CA Root3
certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3  -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185138 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3689: MegaBridge_3_2: Creating Root CA Root3  - PASSED
chains.sh: Exporting Root CA Root3.der
certutil -L -d Root3DB -r -n Root3 -o Root3.der
chains.sh: #3690: MegaBridge_3_2: Exporting Root CA Root3.der  - PASSED
chains.sh: Creating DB Root4DB
certutil -N -d Root4DB -f Root4DB/dbpasswd
chains.sh: #3691: MegaBridge_3_2: Creating DB Root4DB  - PASSED
chains.sh: Creating Root CA Root4
certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4  -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185139 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3692: MegaBridge_3_2: Creating Root CA Root4  - PASSED
chains.sh: Exporting Root CA Root4.der
certutil -L -d Root4DB -r -n Root4 -o Root4.der
chains.sh: #3693: MegaBridge_3_2: Exporting Root CA Root4.der  - PASSED
chains.sh: Creating DB Root5DB
certutil -N -d Root5DB -f Root5DB/dbpasswd
chains.sh: #3694: MegaBridge_3_2: Creating DB Root5DB  - PASSED
chains.sh: Creating Root CA Root5
certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5  -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185140 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3695: MegaBridge_3_2: Creating Root CA Root5  - PASSED
chains.sh: Exporting Root CA Root5.der
certutil -L -d Root5DB -r -n Root5 -o Root5.der
chains.sh: #3696: MegaBridge_3_2: Exporting Root CA Root5.der  - PASSED
chains.sh: Creating DB Root6DB
certutil -N -d Root6DB -f Root6DB/dbpasswd
chains.sh: #3697: MegaBridge_3_2: Creating DB Root6DB  - PASSED
chains.sh: Creating Root CA Root6
certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6  -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185141 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3698: MegaBridge_3_2: Creating Root CA Root6  - PASSED
chains.sh: Exporting Root CA Root6.der
certutil -L -d Root6DB -r -n Root6 -o Root6.der
chains.sh: #3699: MegaBridge_3_2: Exporting Root CA Root6.der  - PASSED
chains.sh: Creating DB Root7DB
certutil -N -d Root7DB -f Root7DB/dbpasswd
chains.sh: #3700: MegaBridge_3_2: Creating DB Root7DB  - PASSED
chains.sh: Creating Root CA Root7
certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7  -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185142 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3701: MegaBridge_3_2: Creating Root CA Root7  - PASSED
chains.sh: Exporting Root CA Root7.der
certutil -L -d Root7DB -r -n Root7 -o Root7.der
chains.sh: #3702: MegaBridge_3_2: Exporting Root CA Root7.der  - PASSED
chains.sh: Creating DB Root8DB
certutil -N -d Root8DB -f Root8DB/dbpasswd
chains.sh: #3703: MegaBridge_3_2: Creating DB Root8DB  - PASSED
chains.sh: Creating Root CA Root8
certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8  -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185143 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3704: MegaBridge_3_2: Creating Root CA Root8  - PASSED
chains.sh: Exporting Root CA Root8.der
certutil -L -d Root8DB -r -n Root8 -o Root8.der
chains.sh: #3705: MegaBridge_3_2: Exporting Root CA Root8.der  - PASSED
chains.sh: Creating DB Root9DB
certutil -N -d Root9DB -f Root9DB/dbpasswd
chains.sh: #3706: MegaBridge_3_2: Creating DB Root9DB  - PASSED
chains.sh: Creating Root CA Root9
certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9  -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185144 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3707: MegaBridge_3_2: Creating Root CA Root9  - PASSED
chains.sh: Exporting Root CA Root9.der
certutil -L -d Root9DB -r -n Root9 -o Root9.der
chains.sh: #3708: MegaBridge_3_2: Exporting Root CA Root9.der  - PASSED
chains.sh: Creating DB Bridge11DB
certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd
chains.sh: #3709: MegaBridge_3_2: Creating DB Bridge11DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge11Req.der
certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US"  -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o Bridge11Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3710: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der  - PASSED
chains.sh: Creating certficate Bridge11Root1.der signed by Root1
certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 519185145 -7 Bridge11@Root1  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #3711: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1  - PASSED
chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3712: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root2.der signed by Root2
certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 519185146 -7 Bridge11@Root2  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #3713: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2  - PASSED
chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3714: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root3.der signed by Root3
certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 519185147 -7 Bridge11@Root3  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #3715: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3  - PASSED
chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3716: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge11DB database
cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7
chains.sh: #3717: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database  - PASSED
chains.sh: Creating DB Bridge12DB
certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd
chains.sh: #3718: MegaBridge_3_2: Creating DB Bridge12DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge12Req.der
certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US"  -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o Bridge12Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3719: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der  - PASSED
chains.sh: Creating certficate Bridge12Root4.der signed by Root4
certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 519185148 -7 Bridge12@Root4  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #3720: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4  - PASSED
chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3721: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root5.der signed by Root5
certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 519185149 -7 Bridge12@Root5  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #3722: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5  - PASSED
chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3723: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root6.der signed by Root6
certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 519185150 -7 Bridge12@Root6  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #3724: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6  - PASSED
chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3725: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge12DB database
cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7
chains.sh: #3726: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database  - PASSED
chains.sh: Creating DB Bridge13DB
certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd
chains.sh: #3727: MegaBridge_3_2: Creating DB Bridge13DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge13Req.der
certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US"  -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o Bridge13Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3728: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der  - PASSED
chains.sh: Creating certficate Bridge13Root7.der signed by Root7
certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 519185151 -7 Bridge13@Root7  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #3729: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7  - PASSED
chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3730: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root8.der signed by Root8
certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 519185152 -7 Bridge13@Root8  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #3731: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8  - PASSED
chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3732: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root9.der signed by Root9
certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 519185153 -7 Bridge13@Root9  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #3733: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9  - PASSED
chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3734: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge13DB database
cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7
chains.sh: #3735: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database  - PASSED
chains.sh: Creating DB Bridge21DB
certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd
chains.sh: #3736: MegaBridge_3_2: Creating DB Bridge21DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge21Req.der
certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US"  -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o Bridge21Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3737: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der  - PASSED
chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11
certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 519185154 -7 Bridge21@Bridge11  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #3738: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11  - PASSED
chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3739: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12
certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 519185155 -7 Bridge21@Bridge12  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #3740: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12  - PASSED
chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3741: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13
certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 519185156 -7 Bridge21@Bridge13  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #3742: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13  - PASSED
chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3743: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge21DB database
cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7
chains.sh: #3744: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3745: MegaBridge_3_2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3746: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21
certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 519185157   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #3747: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21  - PASSED
chains.sh: Importing certificate CA1Bridge21.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3748: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3749: MegaBridge_3_2: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3750: MegaBridge_3_2: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 519185158   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #3751: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3752: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp       -t Root1.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der  -t Root1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185136 (0x1ef222f0)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root1 ROOT CA,O=Root1,C=US"
        Validity:
            Not Before: Fri May 19 18:54:48 2017
            Not After : Thu May 19 18:54:48 2067
        Subject: "CN=Root1 ROOT CA,O=Root1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:4a:58:df:d9:53:c5:87:80:9f:66:e2:41:bb:f1:ea:
                    c0:ad:85:ac:b4:aa:0d:29:81:80:cf:92:a3:15:ef:3d:
                    a1:f8:55:f2:1d:34:f0:cb:36:68:15:a3:5c:c7:4e:2c:
                    50:87:63:5f:22:e6:d7:dc:16:a1:b5:70:c5:5c:f7:67:
                    ac:52:e7:01:c7:45:fb:3e:9a:c9:18:8b:75:1a:7f:37:
                    f2:62:5f:e7:89:b5:b0:0b:c8:87:d3:b2:1c:ff:db:11:
                    53:fb:0e:88:1f:71:e3:27:34:fd:1b:85:ff:86:22:b2:
                    74:ab:ce:8b:de:83:67:53:95:ad:c2:dd:2b:b9:3f:fa:
                    d5:a2:9c:a1:9e:c1:21:bb:ba:a4:d2:a2:22:f4:04:2f:
                    3b:7a:68:90:bc:d6:7f:38:9b:a7:80:b5:90:45:57:08:
                    40:fc:c5:9b:0d:4a:86:db:e8:44:09:3a:52:ca:eb:02:
                    0e:24:2d:1b:28:f0:aa:83:52:96:cc:c6:22:18:2c:c1:
                    2d:d0:9f:a6:c1:33:71:53:13:ad:9f:d9:fc:c7:11:b9:
                    9f:45:eb:08:78:74:68:10:a9:27:27:f4:48:49:51:7e:
                    2f:23:25:62:0f:0a:14:ec:cd:21:3f:b8:48:64:4e:58:
                    fb:68:6a:2c:e0:fb:68:3f:8c:c4:d0:f7:f1:06:c8:93
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        72:b7:49:fe:35:76:5f:e7:20:ec:30:70:a6:85:98:56:
        cb:c1:01:a9:c0:72:2f:5a:db:16:11:b5:2c:61:75:e7:
        31:83:4f:95:ab:f2:5b:c4:77:0a:be:08:eb:e8:e0:45:
        78:5d:a9:78:19:8d:c3:12:7e:a6:6a:12:c6:fc:da:1b:
        76:62:3a:76:9b:b0:af:7f:2c:97:1e:12:44:09:3c:49:
        64:ec:72:d1:67:fb:bc:42:86:4f:56:c5:8e:4a:e7:a4:
        08:bd:5c:01:54:19:c7:35:9d:c9:a3:68:30:d7:20:21:
        70:5f:93:40:87:6b:37:4a:09:8d:c3:ac:fe:60:6b:53:
        cd:86:02:8a:a8:b3:3a:dd:d9:ee:02:7a:e4:c2:48:86:
        96:f6:77:12:ae:91:02:84:ff:ba:e9:83:b8:da:4d:f1:
        0f:34:97:f6:ce:66:dc:a1:31:02:b4:4a:5d:3f:62:44:
        65:0a:f6:9d:f5:de:57:ba:45:b1:9d:4e:fb:73:55:4b:
        0f:b8:5a:62:57:07:40:08:72:96:8d:17:eb:48:5c:8b:
        a9:0d:8c:62:b6:64:e4:3f:90:99:cc:92:19:e7:a8:c5:
        d9:76:3c:ab:4c:84:3d:14:9c:70:40:c5:82:83:76:32:
        32:6a:39:dd:7e:d3:fa:c5:84:f0:33:3a:c6:68:5e:7d
    Fingerprint (SHA-256):
        FE:98:A1:E0:71:3D:E6:28:B4:56:2B:FC:A5:D0:3E:09:B2:EF:58:A3:73:51:D8:D0:DE:6D:F6:27:82:26:FE:7A
    Fingerprint (SHA1):
        E8:D3:42:17:50:F1:4A:F0:8E:66:EC:AB:3D:A0:E0:D6:C6:78:19:39


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #3753: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp       -t Root1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp       -t Root2.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der  -t Root2.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185137 (0x1ef222f1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root2 ROOT CA,O=Root2,C=US"
        Validity:
            Not Before: Fri May 19 18:54:56 2017
            Not After : Thu May 19 18:54:56 2067
        Subject: "CN=Root2 ROOT CA,O=Root2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:a2:e7:7d:92:47:73:75:de:2f:a7:56:92:86:7a:5a:
                    33:e9:21:73:ae:d9:b8:3a:c1:70:5f:04:3b:90:55:53:
                    5c:b6:f5:6e:98:4b:6b:8a:6e:af:e9:5f:04:6f:30:81:
                    ab:76:96:58:e3:5d:8b:92:47:38:0f:a0:41:96:7e:7e:
                    6b:8c:b3:61:c2:da:e9:f2:11:ee:49:bf:17:6f:98:09:
                    b7:62:33:70:d1:f4:ad:69:2e:77:dd:ea:a1:7e:7e:da:
                    09:a1:ae:e8:4e:41:40:76:3d:d3:36:ec:34:3f:31:41:
                    a0:f9:fe:f3:05:bf:6a:40:98:18:f9:35:48:02:f5:20:
                    40:61:63:47:25:ad:5c:74:ab:ce:ca:c8:95:dc:93:b6:
                    5f:a1:da:0e:7a:50:6c:93:8d:c9:32:88:18:60:b8:ad:
                    0f:fc:4e:d4:af:38:66:33:c4:c6:2a:a6:b7:f7:71:84:
                    af:3a:cd:43:08:94:58:77:dc:14:8a:e3:f8:6d:1b:df:
                    a2:32:3c:27:6f:f0:a9:eb:da:2e:ed:c5:0a:88:29:a6:
                    71:76:35:ad:a7:95:54:64:2d:e7:93:5d:db:b7:2f:f6:
                    02:52:b1:9f:4f:a0:8a:ff:82:35:52:55:fe:82:b5:13:
                    7b:39:48:4d:dd:41:8c:f2:20:0a:c5:f7:25:bf:ab:89
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        8f:90:37:4a:1b:5e:9c:a4:b8:e7:2f:42:da:e3:66:af:
        6d:0f:2c:84:fc:4e:ac:a7:71:4e:77:b6:4b:f5:fc:44:
        c3:78:51:0c:8a:34:4f:b1:f7:cb:c5:6c:95:52:96:0c:
        30:3a:a0:19:bd:8a:bc:f8:f9:f8:83:fa:08:cb:01:d8:
        5d:35:d3:39:7d:43:3f:2e:93:23:12:43:89:89:29:89:
        08:5f:e8:e9:9b:b3:aa:63:3f:28:6c:7a:a7:19:cc:28:
        ab:40:de:2b:9c:62:f3:7e:03:ff:f7:5c:14:f8:c6:77:
        f1:57:a9:67:49:9e:56:21:0e:f4:e5:b8:e3:5a:ec:5a:
        22:cd:56:18:90:8c:8a:21:58:7f:ba:1c:99:1f:aa:39:
        8e:63:92:b5:2d:c8:bc:05:52:41:9d:fc:be:6e:15:96:
        03:1d:04:a7:a2:82:d6:96:1e:4d:c7:0f:52:1c:25:45:
        63:dc:fe:fa:90:ba:f5:e5:ce:2e:9e:dd:d9:c9:d3:d9:
        df:be:d7:5c:46:3e:cc:d6:46:50:00:23:78:29:85:64:
        e3:f9:71:5e:d2:2a:b6:2d:7b:db:05:aa:2e:51:78:f9:
        07:0c:8f:27:b0:62:0a:83:b1:ae:94:f6:b9:01:6f:3b:
        02:24:0d:35:91:93:d0:a3:56:86:4a:9c:aa:bc:e4:54
    Fingerprint (SHA-256):
        9A:C3:34:A5:FB:2C:DC:C5:80:99:10:69:AF:A2:A3:95:11:B2:F0:FC:5E:9A:E5:7E:F5:F2:3A:76:85:32:9B:59
    Fingerprint (SHA1):
        3F:02:89:A5:5B:23:72:85:71:71:05:7E:AA:AF:16:6F:ED:3F:F0:33


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #3754: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp       -t Root2.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp       -t Root3.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der  -t Root3.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185138 (0x1ef222f2)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root3 ROOT CA,O=Root3,C=US"
        Validity:
            Not Before: Fri May 19 18:55:17 2017
            Not After : Thu May 19 18:55:17 2067
        Subject: "CN=Root3 ROOT CA,O=Root3,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:8b:c5:ee:f8:71:d7:4b:6e:85:42:df:1e:39:9c:85:
                    28:e4:4b:87:a1:f9:9d:6d:40:84:e4:62:20:1c:e7:1f:
                    38:cb:49:2c:28:f6:a6:01:a9:47:88:47:b8:d8:1e:85:
                    cf:b1:91:f5:af:e0:14:ee:ca:54:03:b1:df:e4:8c:6a:
                    64:c3:ce:d4:ee:7e:0b:71:75:ab:95:09:97:27:58:2a:
                    dc:ab:ab:e3:29:c5:1f:af:c4:ce:98:1f:57:b9:88:36:
                    12:a8:e3:b8:ee:f9:1c:26:4f:40:b0:77:91:d4:9f:b8:
                    37:05:86:cb:fd:80:3c:54:a1:b0:57:ef:44:68:3c:7a:
                    ca:08:27:9a:4f:ce:07:7f:f3:13:90:f0:6a:ac:c6:96:
                    31:66:ee:98:53:db:f0:70:cb:4a:11:4a:11:86:e3:a0:
                    59:b7:9f:5c:30:76:a6:6a:8c:df:67:29:88:b8:87:d2:
                    47:8a:40:af:7a:bd:0e:6f:f6:1e:cc:ad:a1:0a:51:84:
                    fd:af:03:5e:c7:6f:31:df:1e:7b:76:29:2e:9e:d6:40:
                    67:9b:f6:81:56:66:b9:0d:01:46:6a:ce:c4:1d:e1:9b:
                    ae:ec:11:b1:9c:fd:8c:cc:dc:c2:44:26:09:fb:cb:a1:
                    f8:87:ce:c8:e5:36:62:22:f1:58:41:8b:95:d5:f1:4f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        46:aa:b8:83:0a:b0:a4:5b:20:85:8f:6c:3d:41:31:c3:
        aa:27:1a:d3:ff:93:9a:7b:c6:bb:16:25:6a:cd:22:63:
        27:18:ce:dd:9e:2c:b0:7a:da:5d:7d:f5:bb:77:d0:cd:
        cb:b7:f2:15:84:fb:f5:4c:11:3f:dd:2a:da:e6:91:75:
        2f:df:b5:b6:9a:22:8b:7e:f7:50:f5:f2:f4:f7:a4:48:
        4d:64:f4:f1:c0:8e:0c:92:16:13:42:b6:1a:c4:1e:e7:
        25:ea:6b:d8:0a:33:d0:e4:6a:9a:cb:c5:df:44:08:ee:
        fd:dd:cc:c1:30:51:e7:c2:0f:b1:b2:b4:e8:7f:79:12:
        98:6b:4c:b1:db:41:64:a7:db:96:8a:19:a8:6b:b1:a9:
        c9:dc:fe:28:a7:42:8b:27:b9:c7:d0:05:c1:ef:b3:49:
        e5:36:8e:c3:de:a0:aa:29:0a:78:19:81:92:db:e1:d8:
        55:d8:94:59:c2:8b:eb:12:6f:c6:98:88:6b:5f:c4:c8:
        b3:b7:40:aa:ba:95:73:d9:c3:a0:d3:00:09:cc:89:5b:
        b9:77:ff:ff:19:c5:de:1a:91:2d:f1:8e:64:5c:d7:37:
        13:44:45:9e:8a:c3:0e:64:fc:ae:30:57:51:6c:6c:c9:
        7d:56:83:66:1d:93:51:45:73:4f:23:c7:49:8c:8c:d9
    Fingerprint (SHA-256):
        B1:48:D1:3E:FE:54:85:5E:4B:B7:E2:D7:2E:D0:57:CD:A9:E3:FD:88:FF:34:82:4F:4C:FE:53:DA:69:02:AE:FE
    Fingerprint (SHA1):
        7B:8A:51:43:44:17:16:F7:E9:3E:F5:03:9A:72:45:D0:BC:E3:2D:E9


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #3755: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp       -t Root3.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp       -t Root4.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der  -t Root4.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185139 (0x1ef222f3)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root4 ROOT CA,O=Root4,C=US"
        Validity:
            Not Before: Fri May 19 18:55:25 2017
            Not After : Thu May 19 18:55:25 2067
        Subject: "CN=Root4 ROOT CA,O=Root4,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c0:5d:c5:42:7c:7f:38:d9:de:5a:8c:10:c2:b9:a3:62:
                    1a:74:85:ff:ca:c9:5a:e3:c6:b8:70:99:09:4b:8c:74:
                    08:e7:31:26:43:78:f7:e0:f5:a8:58:2d:9e:bb:2b:cd:
                    fe:34:d1:ee:02:4d:1d:84:0b:eb:e2:5b:8c:96:04:31:
                    78:8c:5d:8c:46:84:a0:86:86:b3:d2:f5:ec:5e:f5:f2:
                    60:63:6f:37:94:f0:aa:32:ac:b6:a0:5e:6f:32:4f:4a:
                    6e:f6:eb:00:3e:0b:9b:d9:a7:4a:42:62:45:6b:0f:a2:
                    49:17:97:8f:85:d0:04:e0:54:86:18:ea:74:fe:53:ea:
                    44:73:22:1d:10:8e:2f:9b:77:69:2d:63:b4:61:71:45:
                    37:77:c7:25:a9:89:b4:f7:7a:60:35:c7:df:b0:ae:3d:
                    23:ad:0f:ea:cb:18:86:1b:fa:b2:79:29:d3:6f:5a:cd:
                    31:d4:09:68:92:3e:71:4c:c2:ab:11:08:eb:1f:35:c6:
                    28:46:d8:64:e5:7a:5b:8f:00:94:66:2d:71:1a:9e:ed:
                    a8:e4:aa:3c:72:17:85:33:a9:78:67:c1:b9:87:1f:ef:
                    e1:bf:82:d8:3d:2b:6e:73:f8:43:2a:aa:3d:f6:9a:39:
                    21:8e:5e:a5:70:ee:79:9f:cb:83:21:9e:b1:15:59:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        16:98:21:0a:07:46:61:59:f6:6a:48:35:4f:7f:c7:4e:
        58:d1:05:a8:e7:ae:d5:70:21:fb:77:93:b4:a6:01:ab:
        06:ac:7b:45:13:da:25:3a:57:e3:07:29:78:dc:90:9f:
        a8:06:39:3c:b7:7f:db:24:a2:9f:2c:3c:25:81:c4:d5:
        db:49:e4:cf:40:13:15:8d:d7:0c:1a:18:9a:70:06:e3:
        2f:0e:59:da:a3:90:9f:6a:4b:55:78:61:36:0b:88:0c:
        65:12:01:a2:55:98:d9:61:d2:57:e7:05:66:39:db:35:
        a5:42:69:a0:f2:ee:0f:7d:ee:89:eb:d9:6b:bf:ff:3d:
        d2:70:d4:93:b4:c2:e5:46:bb:e1:99:10:f1:cf:a5:5d:
        8f:ac:66:1e:e9:c9:ca:55:53:04:db:07:96:b8:1f:b5:
        a2:0b:c4:86:a8:fe:28:36:bd:56:cd:70:c4:0f:f8:8d:
        21:ee:64:da:9d:92:36:30:73:dc:e5:c7:44:fa:68:77:
        b1:08:a7:8c:31:88:24:99:5e:5c:8e:ae:5a:15:67:09:
        28:cc:e9:e2:6e:ab:37:bd:c0:3c:f8:90:3a:d8:a9:39:
        00:fd:da:6d:b0:ff:a6:6a:3b:af:54:a7:9b:61:05:a9:
        87:db:8d:3c:c3:73:28:cc:69:a5:5d:29:6d:cb:64:70
    Fingerprint (SHA-256):
        B1:3F:8B:88:DB:BE:69:FB:D0:5E:56:F8:D7:15:F6:3C:EF:5F:13:90:C7:C0:A8:1D:35:9C:3B:FB:9E:17:29:17
    Fingerprint (SHA1):
        0E:3D:D2:56:18:B1:5E:80:4B:8A:47:37:4F:2B:9F:1B:47:2A:B1:45


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #3756: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp       -t Root4.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp       -t Root5.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der  -t Root5.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185140 (0x1ef222f4)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root5 ROOT CA,O=Root5,C=US"
        Validity:
            Not Before: Fri May 19 18:55:37 2017
            Not After : Thu May 19 18:55:37 2067
        Subject: "CN=Root5 ROOT CA,O=Root5,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a2:68:ed:88:d1:c6:96:b6:0c:13:80:98:ab:a4:c2:d5:
                    ab:c6:8f:78:ad:95:3f:30:da:1e:0d:50:74:2e:1e:22:
                    de:f8:76:bd:97:c7:d8:8d:9b:a2:1a:a4:8a:93:d5:57:
                    b7:a6:5a:59:88:b6:84:1a:1a:00:20:a0:fb:ba:5a:52:
                    3f:7b:34:be:48:d9:02:77:d6:dd:91:94:97:9c:f4:da:
                    df:e8:cd:5e:75:38:7e:bc:b5:09:90:62:7f:20:eb:b4:
                    73:7d:5a:a4:0d:72:33:63:e2:82:0d:d9:b6:9a:63:b2:
                    c4:9c:d8:9a:e0:ad:ed:84:4f:ad:9f:08:15:e1:24:29:
                    e7:07:61:36:48:4a:4e:00:b1:d7:0f:e2:ef:56:15:21:
                    77:91:4e:2f:e8:ce:26:d3:f8:2f:bf:ab:4f:89:d5:58:
                    48:f7:70:1d:8e:43:9f:df:08:3a:39:3c:0e:f0:03:87:
                    54:13:d0:87:7b:3c:3d:28:88:25:ef:a4:ba:9f:a7:23:
                    15:3c:74:86:36:04:36:a2:27:f8:15:84:a1:a7:b1:b6:
                    23:57:7f:8b:9d:62:54:cd:d9:97:94:a1:26:a8:e9:c8:
                    d3:df:0b:33:2c:b5:70:23:bd:fe:cc:a3:b2:84:e8:86:
                    19:4f:e6:d1:08:b0:64:10:4d:91:4d:28:86:27:7c:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        37:55:77:f1:b9:dc:95:d8:a1:59:89:e8:9d:6f:c6:f2:
        6b:5f:25:3b:79:46:a2:3c:9c:6c:36:f1:89:99:97:3f:
        d5:3e:74:f3:d2:38:d1:8c:00:59:fb:f9:a8:01:5b:1a:
        1a:09:f6:03:f5:eb:96:08:7f:a4:03:16:f8:ec:8c:bd:
        67:75:eb:ca:74:01:fc:73:e7:10:b9:7b:35:56:27:65:
        16:37:bf:2c:aa:47:18:ff:78:a5:c2:25:47:9e:a1:7a:
        5b:f7:70:7b:67:4b:45:aa:7c:c4:5d:6f:bd:9b:9c:27:
        2d:58:6f:ef:12:3b:9e:d8:ee:33:48:6c:e4:6b:e9:cb:
        9d:df:ac:27:02:d5:13:d8:f9:03:cb:e2:c1:f6:c8:8f:
        29:4d:01:f3:d1:23:ef:61:cb:f7:0f:26:ed:60:f1:01:
        fe:c4:cb:43:3e:61:6f:45:04:4f:9c:92:9c:e7:e3:9d:
        a4:53:2d:74:e7:84:f7:f3:86:cb:2f:e8:79:94:16:ef:
        3a:74:c8:c4:9b:da:5e:8a:dc:c9:18:4f:3e:82:61:94:
        1a:5f:7a:aa:9f:47:f7:b3:6e:9a:1f:c3:00:a2:f2:f4:
        77:63:a2:97:de:c0:da:c9:12:9c:53:eb:53:d9:7f:e5:
        bc:0b:01:8c:a8:f7:09:81:49:22:1d:f2:fb:1c:4f:c1
    Fingerprint (SHA-256):
        EB:AE:42:15:41:C0:CA:ED:2F:1F:E1:01:46:C9:EE:5C:1A:3E:67:7E:F2:52:E6:19:35:A4:E3:A1:27:0A:E9:52
    Fingerprint (SHA1):
        2F:39:E0:B2:F6:B6:01:74:A8:A1:D3:33:F5:DC:49:9B:A8:CE:B6:45


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #3757: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp       -t Root5.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp       -t Root6.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der  -t Root6.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185141 (0x1ef222f5)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root6 ROOT CA,O=Root6,C=US"
        Validity:
            Not Before: Fri May 19 18:55:42 2017
            Not After : Thu May 19 18:55:42 2067
        Subject: "CN=Root6 ROOT CA,O=Root6,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    aa:4a:89:6d:96:d5:44:c0:eb:02:ae:9a:f6:10:81:4c:
                    42:e4:66:69:87:78:b4:7f:70:a3:70:ca:28:ea:66:5c:
                    b3:48:5b:b6:d8:da:2a:85:14:56:6f:98:25:4b:0b:7a:
                    08:a9:c5:47:ff:82:14:01:fb:b3:b7:11:31:f5:fe:39:
                    81:38:51:74:d8:e3:dc:44:b1:87:76:2d:6b:c6:a0:37:
                    62:76:9e:a1:3e:66:4a:6f:d2:98:7d:19:0c:40:d1:c9:
                    31:75:b8:8f:be:5d:41:9b:ce:a1:94:21:31:d2:ff:ce:
                    12:1e:84:76:23:2d:f9:ac:cc:d7:57:4c:e3:3d:93:63:
                    23:ad:7d:60:37:6a:44:36:80:57:64:d9:e1:9e:dc:d8:
                    26:64:c5:58:77:05:10:66:0d:0c:6e:05:ac:68:5d:77:
                    e8:95:f8:7f:62:1a:66:23:53:b9:b0:77:1c:f4:a0:ce:
                    9f:9c:0a:c5:c6:4f:4a:87:c5:6b:1e:ea:55:6a:73:c8:
                    3c:d9:cf:76:07:a3:75:32:2a:d3:d8:be:fb:2a:75:be:
                    34:2f:4f:d0:f9:62:ce:be:c3:33:3b:aa:94:25:9a:73:
                    35:68:a2:d7:ea:d6:4b:d7:fe:7d:1c:78:fe:cc:36:9e:
                    fd:f6:fa:f2:e8:e1:4a:b6:35:cd:38:80:26:30:cf:9b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        02:ea:ec:73:ff:07:b4:7d:7b:e4:96:8d:f1:2d:e7:5c:
        c9:b2:f9:1b:31:cc:aa:7f:72:c6:4d:1d:51:ba:96:2d:
        2f:32:b6:c0:5d:b6:e7:aa:2f:28:d3:02:ab:a9:37:70:
        57:4a:47:98:17:46:91:3a:a5:9d:96:de:0a:61:b8:ad:
        45:6b:4d:36:29:0a:d8:51:56:5f:66:a6:89:14:4e:41:
        bd:97:bc:2b:5e:08:7e:b8:cf:33:4a:9f:1a:6b:a0:78:
        3b:d9:cb:5e:80:00:ef:c1:31:01:95:cb:ad:db:ed:a9:
        ed:b4:95:08:00:e4:5a:b0:40:35:2e:f3:78:c6:96:ca:
        3c:1f:90:23:c0:90:b3:e9:bd:94:0e:d0:8c:e1:82:bd:
        67:12:c4:ce:84:f1:9d:78:f4:19:0d:20:50:1e:a9:9e:
        0a:88:29:c9:e3:0e:0f:68:38:ec:66:3a:61:70:41:98:
        41:ba:dc:7c:f1:9d:7a:5e:a6:bb:fc:e6:32:05:13:ab:
        ba:84:83:c2:07:55:3d:49:fd:df:5c:8f:74:11:da:79:
        10:9b:ee:64:64:c9:26:04:f7:05:38:31:06:59:71:69:
        a8:59:66:6e:21:47:ba:6d:ab:4d:26:65:da:91:ce:17:
        dc:a5:ec:68:ce:47:72:4b:eb:8c:00:a6:e4:61:d9:7f
    Fingerprint (SHA-256):
        E5:F3:A4:5F:4B:DB:30:34:8F:49:E8:6A:A1:1F:C9:91:AF:0E:34:D7:E1:85:16:6D:7B:69:FE:40:0C:E3:A1:20
    Fingerprint (SHA1):
        E3:6B:34:59:AC:A7:F4:5B:30:AE:96:4B:55:78:E8:B7:77:A2:A0:1D


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #3758: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp       -t Root6.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp       -t Root7.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der  -t Root7.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185142 (0x1ef222f6)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root7 ROOT CA,O=Root7,C=US"
        Validity:
            Not Before: Fri May 19 18:55:50 2017
            Not After : Thu May 19 18:55:50 2067
        Subject: "CN=Root7 ROOT CA,O=Root7,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9c:ea:62:2a:71:e5:c9:24:d3:67:1b:5d:a7:a4:44:3b:
                    8e:12:bd:01:cc:67:fa:06:cd:e0:f2:18:17:e8:c2:13:
                    97:b0:cb:64:59:55:ec:0f:71:a4:55:9b:b5:58:6d:0d:
                    09:5f:b1:06:68:cf:94:6e:7d:34:26:ad:43:f5:23:ff:
                    e2:36:b0:27:c7:36:8c:05:64:68:4d:c4:11:98:41:35:
                    7f:b9:60:ef:2d:f5:ac:44:d8:7c:85:d7:a7:f2:ae:16:
                    78:e5:56:15:45:33:8d:fa:43:16:01:9c:b1:31:c3:0a:
                    fb:41:61:e0:93:5a:71:4c:32:e1:0a:40:bb:94:a7:ff:
                    4f:ab:64:e8:28:d5:1b:7d:96:aa:6e:4e:7c:d4:2a:d9:
                    9b:4e:2b:a4:e9:d6:b3:d1:18:8c:79:f6:9d:a0:b8:a6:
                    ee:a7:24:ad:3c:36:78:5f:45:b4:c5:30:2f:f6:78:64:
                    58:77:14:4c:88:30:47:38:51:73:44:b9:3f:d2:f8:11:
                    10:ca:c4:8c:1c:6e:e9:1e:51:56:90:67:5a:18:ad:5a:
                    b9:14:4e:64:ed:74:b5:ff:ee:da:77:6f:d3:fd:22:9a:
                    a8:5d:cc:bf:ba:07:de:eb:12:93:27:53:3e:49:b9:11:
                    47:d7:dd:e2:d2:9c:7b:f6:4b:7f:b2:09:00:f5:b8:b5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        62:4a:07:10:7a:a3:c3:2a:67:c7:3a:fc:af:49:0b:cd:
        99:f2:78:8b:fc:8c:a0:c2:45:c8:cb:f1:ba:ad:b9:79:
        49:bf:e2:d7:58:4d:ca:86:09:4b:26:e8:9b:76:af:a6:
        fc:c7:89:b0:49:f0:58:66:4d:2e:a9:d7:12:5b:75:ec:
        b6:33:8a:35:38:51:af:3e:0c:be:80:36:07:f3:95:87:
        a9:3d:23:18:27:97:a6:76:ed:99:a8:be:1f:20:7f:89:
        31:a5:0f:3e:b6:a6:e1:21:e5:fb:16:15:6f:8b:e3:11:
        90:55:57:ff:56:26:cf:6c:23:26:c6:c7:2c:75:87:98:
        8a:57:65:ed:93:ad:e8:b7:dc:cd:f8:4d:45:87:e0:95:
        a0:5c:78:12:34:4a:a1:66:8b:0d:12:23:01:4d:57:cf:
        0a:64:71:ca:79:96:1d:3b:90:1c:ab:87:a1:35:7c:93:
        f2:74:38:53:33:6c:67:78:67:74:b7:5f:a7:0d:b7:0c:
        09:74:9b:d9:a5:b6:c4:11:f7:13:01:64:2a:18:32:b7:
        5b:bf:77:d0:c6:1a:ba:be:eb:42:6b:5e:e4:53:a3:12:
        ab:03:c7:b8:4b:10:b3:a8:87:9e:35:b1:cb:8b:12:e6:
        52:10:4a:50:ee:9a:90:48:7f:03:ae:5d:b9:b2:05:55
    Fingerprint (SHA-256):
        60:39:AF:BE:B9:E1:2D:DC:0C:36:CA:3C:0B:E4:7A:6A:43:10:1E:D3:5B:19:D5:05:81:46:CD:70:CC:7F:A5:6F
    Fingerprint (SHA1):
        05:07:29:BA:E6:2A:37:5B:04:00:3C:22:4C:B7:31:CF:F6:00:CF:29


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3759: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp       -t Root7.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp       -t Root8.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der  -t Root8.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185143 (0x1ef222f7)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root8 ROOT CA,O=Root8,C=US"
        Validity:
            Not Before: Fri May 19 18:55:55 2017
            Not After : Thu May 19 18:55:55 2067
        Subject: "CN=Root8 ROOT CA,O=Root8,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:e4:f6:b7:39:c5:dd:60:92:0e:b0:ad:dc:44:61:e2:
                    cf:89:a6:55:e2:e4:66:3b:1e:43:45:3d:e7:ee:78:40:
                    9f:26:3c:a8:38:59:4e:c6:00:5f:54:99:59:bb:91:a6:
                    7f:15:42:6a:f4:d5:be:0f:7a:25:b4:f5:93:45:d2:7e:
                    e6:1a:33:de:75:8b:b0:c3:6d:a8:f8:0a:93:07:14:8f:
                    8f:92:09:9c:15:ef:7f:81:9e:a3:d4:17:70:0a:8c:5f:
                    6c:2a:f7:e5:8b:fb:d1:72:ed:b1:54:d8:68:a5:fd:db:
                    33:f6:88:86:2a:d1:0d:56:89:90:2b:b1:1e:12:6f:a0:
                    b7:ef:3a:15:e3:3d:61:77:15:40:69:08:aa:7f:83:0b:
                    36:04:84:88:91:05:2d:7a:f0:c4:94:dc:97:15:e0:d2:
                    ec:83:0f:7e:ea:b2:3b:3c:24:8a:a4:3a:84:69:e5:e9:
                    fb:ac:73:2f:4f:68:f7:33:e3:1c:a3:ec:59:a7:df:d0:
                    3a:53:1f:61:74:7f:b6:84:74:da:39:b2:f1:c1:6b:a7:
                    9b:7b:72:5a:76:fd:29:ed:c1:98:b4:41:2a:c3:e2:bc:
                    d3:87:b9:bf:a1:4c:1b:10:ea:35:04:97:87:15:c8:d6:
                    11:dc:88:71:04:31:7f:18:d0:ec:b6:20:aa:98:8f:4f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        b3:01:c4:78:1a:6c:b7:49:8e:2b:9a:d6:8f:2a:94:f2:
        59:fb:15:27:12:b7:6d:62:cc:aa:97:9d:85:38:20:70:
        0c:8f:7f:ad:52:28:96:91:3d:9d:4b:23:1a:3f:7d:d5:
        ed:16:69:0b:5d:a3:f6:22:48:53:28:59:9f:29:d5:33:
        3b:3b:1e:83:51:74:64:18:bb:a1:36:dd:2b:94:a4:d1:
        dc:d3:fa:a0:cb:11:59:2b:f1:62:82:70:ea:39:1f:ab:
        63:f9:fa:3a:b5:22:65:d4:41:40:2f:e7:02:2f:8d:f3:
        c4:5c:5c:2b:51:42:6c:56:91:1b:96:8a:0e:60:a6:90:
        ae:de:53:d2:31:d0:22:25:f5:54:42:5e:c2:8d:58:c7:
        41:aa:86:ce:a8:34:f9:4a:11:12:3f:68:41:61:c0:68:
        81:bf:69:1c:c2:3c:7e:c5:50:e3:a7:74:af:39:f8:7e:
        66:ef:5b:8c:73:8f:dc:aa:93:74:bb:7e:1e:93:d6:d5:
        6e:37:18:17:b7:72:78:0d:17:59:3b:f8:00:31:25:2c:
        0c:7c:7d:70:df:11:ae:de:3a:35:d4:96:e6:d0:42:e3:
        99:6c:91:1b:a4:3d:52:10:20:c0:9d:8e:9f:a3:8f:9d:
        79:94:53:3e:aa:56:a9:4c:ea:e1:5c:f9:f7:bd:d2:88
    Fingerprint (SHA-256):
        A6:31:5A:2E:C4:96:6E:AA:24:7D:1B:12:58:74:60:C9:E5:72:05:E2:95:AC:83:2C:12:36:5D:8B:C4:9A:3A:85
    Fingerprint (SHA1):
        E5:90:AA:A8:58:D4:B8:F9:98:5E:62:58:46:09:5A:CE:D8:E6:8F:10


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3760: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp       -t Root8.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp       -t Root9.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der  -t Root9.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185144 (0x1ef222f8)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root9 ROOT CA,O=Root9,C=US"
        Validity:
            Not Before: Fri May 19 18:56:06 2017
            Not After : Thu May 19 18:56:06 2067
        Subject: "CN=Root9 ROOT CA,O=Root9,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c9:c7:a4:10:cc:55:f5:df:8a:7e:d0:e4:b1:aa:63:7b:
                    62:8d:a7:d1:06:97:2f:1e:f3:33:95:fe:e4:66:ca:06:
                    f6:3e:b8:95:a9:32:9f:76:86:30:b3:7c:5f:3e:41:3c:
                    08:37:d9:e0:de:55:ad:9f:c0:e0:de:f4:c0:02:7c:13:
                    7f:13:9a:63:d3:8c:0b:39:32:a6:70:bb:a2:a3:c0:08:
                    b6:9d:38:5d:ae:60:e8:e2:71:c6:44:41:92:6c:06:09:
                    7b:22:73:4c:94:3b:2b:76:58:62:6d:d6:47:de:a6:eb:
                    e6:ac:85:09:9d:24:c2:a2:9f:6b:cb:27:57:7c:ef:b0:
                    12:1b:5f:88:ba:ab:26:71:53:2d:57:ba:96:78:3a:bc:
                    03:96:13:64:74:88:7c:1f:99:0c:76:df:0b:09:fd:4d:
                    25:01:3f:4f:85:b2:17:92:e2:80:07:48:49:76:0b:b1:
                    76:34:71:d5:20:26:2d:21:55:ec:4f:98:e6:8b:47:e5:
                    33:aa:fb:97:55:b4:86:c5:d2:6b:5d:95:1f:c9:17:08:
                    53:2e:f6:2f:4a:c5:49:d5:f7:7c:ba:7c:5e:38:5c:75:
                    27:72:a8:86:e8:db:de:66:e5:c5:49:2e:c3:cc:33:37:
                    60:22:3c:1b:9b:c8:7c:94:a0:86:cf:d2:77:2b:cc:55
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        13:9b:2b:4d:cc:65:47:c7:fa:82:22:23:39:d5:91:c5:
        86:5a:a0:d8:ca:31:b5:90:52:d3:dc:12:5a:13:e6:71:
        9c:f3:08:86:fb:91:67:a3:44:a4:c6:03:06:28:1e:e7:
        f8:24:3c:3c:d8:5c:31:2b:8d:1e:14:bb:e1:de:dd:a2:
        c9:02:13:c7:ab:10:13:e9:31:72:67:62:41:d6:28:00:
        ae:a7:f5:c0:84:8d:1b:e8:2a:95:39:82:71:48:fe:9b:
        e2:14:61:e6:b6:67:b4:cb:4e:57:f8:2d:c4:23:74:b3:
        5f:7b:66:c1:b2:28:1c:0d:8c:c4:7b:17:6f:a4:db:cd:
        21:ef:b8:91:a3:c7:45:62:8d:4d:98:f7:b6:c9:61:7b:
        29:c6:e5:ce:6f:1d:06:e1:41:f5:12:00:fe:83:fb:e5:
        37:51:f6:b4:b4:bd:88:9b:2d:7f:61:71:31:9e:a4:a7:
        fa:d4:34:b2:4d:ed:86:ff:20:7f:c5:45:b8:6b:12:64:
        4b:74:ef:cb:77:85:98:1f:8b:67:d6:9e:87:e8:f8:16:
        f3:99:12:96:75:e9:3d:17:c2:f1:0e:fb:6a:69:65:32:
        eb:6b:bb:48:e7:8d:5b:b9:28:97:27:71:4b:2b:47:30:
        4e:4e:85:ce:4b:8c:0c:9a:f8:c4:83:a5:ea:55:5c:27
    Fingerprint (SHA-256):
        0A:BF:2F:67:D3:51:B0:B2:48:B5:00:9A:3D:FF:6A:65:7C:10:07:AC:06:CD:C6:A8:42:50:84:97:D8:D4:33:6B
    Fingerprint (SHA1):
        51:44:52:FD:8E:47:8B:9F:82:CC:52:CB:1D:C5:CE:45:EA:9F:A3:60


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3761: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp       -t Root9.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3762: Extension: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185159 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3763: Extension: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3764: Extension: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3765: Extension: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3766: Extension: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 519185160   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3767: Extension: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3768: Extension: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3769: Extension: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3770: Extension: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 519185161   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3771: Extension: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3772: Extension: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3773: Extension: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3774: Extension: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 519185162   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3775: Extension: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3776: Extension: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3777: Extension: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185159 (0x1ef22307)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 18:57:58 2017
            Not After : Thu May 19 18:57:58 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:e2:5f:16:91:d8:17:49:02:6f:bb:d6:b5:f2:f3:76:
                    ab:06:12:e5:5d:c2:db:77:f1:1c:b1:90:19:d5:a1:c3:
                    c4:94:39:41:e1:af:fc:54:79:76:9f:5d:ba:d8:c9:ed:
                    f3:b5:97:b1:fe:e7:a2:fc:08:73:c1:01:19:74:a5:a3:
                    ac:ce:29:3c:1e:c5:af:b9:cc:27:bb:b6:55:04:f4:df:
                    55:2a:0c:75:bf:22:8b:17:d0:20:bf:f3:af:2b:45:ca:
                    3f:68:00:ab:44:47:94:2e:3a:d7:b7:e6:2a:f3:8f:52:
                    51:6c:a5:25:12:43:4c:b1:9f:72:d7:81:77:a2:45:69:
                    75:11:a4:6f:6e:ca:43:8c:33:77:14:11:23:a6:15:06:
                    f7:6b:18:20:17:2a:e5:b0:0e:19:63:88:27:51:0e:7f:
                    ac:d3:48:5d:7b:c8:46:6c:75:43:a7:9d:68:5c:18:ce:
                    d6:5a:40:2c:6d:d3:4f:58:2c:95:f4:e7:cf:ea:22:94:
                    82:8a:71:54:e8:47:cd:79:81:d4:48:8f:1a:c6:7c:95:
                    29:8d:3e:f3:c9:3c:e2:b5:0e:9b:a3:83:6e:d8:01:73:
                    94:d7:9d:4e:3f:a0:bc:5a:24:4a:b9:22:fc:40:0d:a7:
                    fd:7c:b3:0e:62:12:54:53:cd:22:f0:b5:c3:4e:2f:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        b3:27:ca:9a:db:16:ab:e7:20:e3:e9:77:b4:f3:9c:94:
        13:f0:e7:d6:9d:0b:c4:a5:6e:9c:1d:5b:aa:cd:56:49:
        2a:3e:4d:8b:61:61:58:a5:b3:7c:5f:6e:df:d2:8f:c0:
        ed:fd:fc:03:4f:58:65:2f:4a:9d:82:b8:94:5d:4a:c7:
        85:5c:7b:7f:ae:1b:3d:9e:cd:2d:49:dd:b9:ae:9f:b4:
        a7:66:9e:55:aa:fd:2c:49:73:7c:c0:cb:37:dc:71:02:
        c7:d2:c8:1d:8c:92:78:3f:9d:51:e3:c7:7d:31:bc:3c:
        08:35:67:17:12:71:56:c5:60:60:5d:83:c3:f0:0e:63:
        94:57:d6:a1:1f:75:2f:57:40:7b:bf:a4:25:01:df:80:
        44:46:21:1d:32:8b:e7:eb:1f:d7:d8:d6:0e:2d:7b:c6:
        a7:8d:65:9f:ca:78:50:dc:09:4b:e9:9b:bb:76:c2:81:
        d3:a9:83:4e:40:b1:01:2a:6f:64:15:65:7f:1e:fb:47:
        00:8b:68:03:02:da:14:fd:e0:23:71:0f:55:eb:01:65:
        04:1e:22:e6:02:e3:8d:25:38:59:4d:70:d6:5f:bb:ec:
        92:0c:2e:59:d0:6a:f3:a2:b0:af:b6:ee:4c:1c:bd:ba:
        ee:9b:0d:57:91:a6:6e:98:5b:e9:f4:99:59:f3:8c:20
    Fingerprint (SHA-256):
        54:CF:E9:F2:FE:8B:40:80:16:7C:CF:56:46:29:EF:70:D3:DE:12:7B:ED:14:9F:FE:7C:03:F1:5F:EA:9E:EF:56
    Fingerprint (SHA1):
        C5:B9:18:A1:AE:7B:9B:A0:9B:53:62:21:DC:67:A2:DC:2C:77:A8:63


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3778: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3779: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185160 (0x1ef22308)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 18:58:04 2017
            Not After : Thu May 19 18:58:04 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ef:30:67:02:60:bf:53:3d:e4:33:a3:72:38:98:25:96:
                    8f:8d:34:92:9c:ac:66:05:99:d9:e8:58:97:a4:5b:b5:
                    bd:b1:ff:8f:0e:28:34:b7:6e:6b:ac:4a:89:61:4f:07:
                    16:82:61:17:b9:e2:35:bf:e3:95:9d:01:44:4c:1f:48:
                    ea:ce:21:37:c6:f6:a3:83:74:85:67:b2:ae:5a:24:f6:
                    6b:47:cd:b0:51:d8:e8:03:ef:2a:e6:4a:96:5d:d4:7a:
                    e4:61:d5:4e:3f:58:56:55:3d:91:1b:e6:42:d3:0b:6d:
                    9b:15:d0:dc:ac:91:1a:60:f8:3d:ab:00:e9:93:03:67:
                    c3:52:33:16:51:c2:4a:cd:7a:b8:f6:71:16:2d:86:6f:
                    83:e6:cd:6d:92:5b:29:3e:06:a1:e4:48:6f:fe:34:a4:
                    41:6f:54:b6:e0:a9:24:07:13:e3:68:bf:00:0a:51:52:
                    1d:b1:0e:ae:b9:ce:cf:ec:36:45:0f:e5:bc:34:6b:df:
                    7e:c9:30:f8:58:19:89:25:29:ec:4e:4c:1a:24:cd:17:
                    9d:00:bb:3c:3a:e9:f5:4c:f6:eb:b4:25:c2:94:f4:59:
                    3d:03:6c:7f:8d:62:3a:47:3d:bb:73:47:66:0e:f5:49:
                    02:da:0b:45:6c:00:ae:b8:75:8e:a5:c3:ff:38:b1:b3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        62:55:1a:a9:41:89:7d:b5:f4:a4:59:02:4c:d8:a3:91:
        66:14:0a:3a:36:c0:eb:cd:bd:8e:54:82:d1:82:bb:8c:
        4d:e1:74:a2:23:c1:a0:91:b0:62:c9:f8:81:9a:3b:63:
        da:06:02:42:ba:25:dd:42:f7:3d:61:4d:bb:cb:16:f2:
        36:87:3c:86:d4:e3:bc:7a:88:11:ec:e3:6c:e9:db:19:
        2b:e0:84:68:69:a8:3e:e7:1f:a9:d9:aa:f1:34:71:c8:
        07:be:3b:bf:b3:94:db:c9:0f:58:06:a0:d8:d6:69:cb:
        4b:c4:25:0b:44:a9:96:e1:c4:13:68:95:e9:6d:19:67:
        83:9f:73:fb:23:49:cf:67:b5:56:c1:94:ef:90:9b:b1:
        fe:03:06:36:1a:ee:4a:30:7f:2f:0d:a0:4c:cc:37:ef:
        43:4c:cc:60:ad:1a:82:17:af:eb:10:f4:5c:1f:16:36:
        ca:ad:6e:5c:1c:d4:7a:cf:8c:c2:fa:40:40:da:76:ef:
        36:bb:9e:c5:ad:b5:bb:9d:b0:b2:aa:d1:4e:93:6d:d7:
        e3:54:21:f5:2d:7a:dd:be:ef:0d:19:41:c9:d0:76:a9:
        67:0e:39:9b:f2:80:f3:25:5c:a7:b5:15:be:72:d6:4d:
        c0:ab:18:85:b7:f6:d7:f7:6b:bb:a5:b6:5b:95:5a:43
    Fingerprint (SHA-256):
        42:3D:79:44:E7:F4:F0:9A:EE:ED:0E:1A:3E:06:B2:D3:AD:A9:AA:84:78:69:E1:05:14:F0:6A:F2:B7:D4:E8:01
    Fingerprint (SHA1):
        30:1A:45:F5:D9:35:68:BC:DA:E2:B9:42:E4:FD:5C:46:E5:08:C7:F7


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3780: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3781: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185161 (0x1ef22309)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 18:58:12 2017
            Not After : Thu May 19 18:58:12 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9c:f8:cc:96:0f:b7:3e:a2:df:ef:39:f6:fb:3a:ba:75:
                    1d:5c:4a:76:00:e5:eb:71:36:48:b7:be:a7:5b:ac:6a:
                    4d:18:8e:67:4b:4f:35:46:16:3b:97:c7:85:cb:74:54:
                    c7:5e:85:fe:ad:88:13:ba:52:9b:00:20:95:ff:7d:8f:
                    eb:2b:f0:63:28:7f:76:f1:f3:b7:42:cd:5f:05:2a:4d:
                    db:ba:08:e8:4f:5c:03:09:a7:43:d3:29:72:bc:53:a3:
                    7f:68:b3:79:3d:b8:6d:3a:2f:30:ef:35:75:fd:95:3f:
                    4f:10:c8:ff:d0:6e:e6:dc:86:7d:65:4b:7c:c3:4e:1d:
                    28:bd:26:71:bd:2c:49:ab:9b:c0:85:db:f3:c5:3c:07:
                    24:bd:ba:78:bd:65:cb:2c:0b:37:f3:b3:72:d6:f3:8f:
                    fd:46:16:d7:f1:0f:0d:ef:66:8d:8f:e0:c7:e4:02:1a:
                    38:b9:b3:b0:ed:cd:5e:ca:5c:23:00:cc:22:a7:34:6d:
                    f4:10:a0:03:22:ad:74:1d:cf:5a:d6:19:bf:d8:87:62:
                    3a:3c:b9:2d:e5:54:e1:45:2f:14:85:23:b1:d7:e4:a0:
                    cb:9c:fc:80:58:c2:b3:20:2e:70:c3:92:62:c0:99:a4:
                    47:05:3d:85:71:ec:34:d5:8b:b8:6d:41:e3:3c:f9:e7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        92:20:64:e8:f7:80:35:d0:52:b3:34:ae:19:d1:99:44:
        e7:48:1b:86:0e:ac:96:b8:13:cd:97:5d:bd:9d:c0:6f:
        51:a6:3e:85:bb:c7:7b:7b:08:11:51:c4:d9:4f:71:50:
        0e:f5:8b:9b:b8:63:94:28:e8:6e:f5:86:5c:78:73:44:
        60:f7:70:24:69:dc:50:e4:03:c7:4d:2b:1a:31:c3:b2:
        82:5a:6b:f7:da:56:e1:5f:ab:13:ba:32:cb:50:c7:0f:
        bc:74:a7:ce:de:71:04:d6:1d:58:1b:9a:80:d6:3d:e3:
        35:90:48:bd:8e:3f:fc:88:38:a3:fb:a4:82:3e:ce:f7:
        34:7b:ba:76:8c:3a:23:82:80:4d:f0:0c:40:28:68:5b:
        e4:d3:72:95:43:17:c8:5b:5f:0b:51:f8:59:13:7b:ad:
        7e:40:37:55:25:22:10:1b:d0:1d:38:91:1f:86:84:8c:
        eb:96:0e:d5:dd:da:da:06:d2:e0:f8:9a:a2:8d:09:ef:
        58:92:41:b5:ce:ab:22:0b:6a:d6:ab:ac:95:27:4c:6c:
        84:2a:a1:19:5a:87:09:03:c5:c2:f0:bf:8d:4e:f6:80:
        07:0e:7c:6c:90:6b:03:58:5d:f6:70:fe:69:f5:7e:2e:
        1d:b1:27:fe:01:46:1b:88:0f:b9:88:40:ac:0f:fc:f1
    Fingerprint (SHA-256):
        AE:A4:A9:A2:11:DD:DD:45:10:DF:DC:DB:22:5E:50:91:F8:21:56:9C:3D:64:02:E9:3E:C7:AF:A9:C0:18:5F:45
    Fingerprint (SHA1):
        39:1B:52:CF:05:D6:92:11:0D:5A:EA:FD:13:7B:66:51:26:E2:9C:3B


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #3782: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3783: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3784: Extension: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3785: Extension: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3786: Extension: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185159 (0x1ef22307)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 18:57:58 2017
            Not After : Thu May 19 18:57:58 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:e2:5f:16:91:d8:17:49:02:6f:bb:d6:b5:f2:f3:76:
                    ab:06:12:e5:5d:c2:db:77:f1:1c:b1:90:19:d5:a1:c3:
                    c4:94:39:41:e1:af:fc:54:79:76:9f:5d:ba:d8:c9:ed:
                    f3:b5:97:b1:fe:e7:a2:fc:08:73:c1:01:19:74:a5:a3:
                    ac:ce:29:3c:1e:c5:af:b9:cc:27:bb:b6:55:04:f4:df:
                    55:2a:0c:75:bf:22:8b:17:d0:20:bf:f3:af:2b:45:ca:
                    3f:68:00:ab:44:47:94:2e:3a:d7:b7:e6:2a:f3:8f:52:
                    51:6c:a5:25:12:43:4c:b1:9f:72:d7:81:77:a2:45:69:
                    75:11:a4:6f:6e:ca:43:8c:33:77:14:11:23:a6:15:06:
                    f7:6b:18:20:17:2a:e5:b0:0e:19:63:88:27:51:0e:7f:
                    ac:d3:48:5d:7b:c8:46:6c:75:43:a7:9d:68:5c:18:ce:
                    d6:5a:40:2c:6d:d3:4f:58:2c:95:f4:e7:cf:ea:22:94:
                    82:8a:71:54:e8:47:cd:79:81:d4:48:8f:1a:c6:7c:95:
                    29:8d:3e:f3:c9:3c:e2:b5:0e:9b:a3:83:6e:d8:01:73:
                    94:d7:9d:4e:3f:a0:bc:5a:24:4a:b9:22:fc:40:0d:a7:
                    fd:7c:b3:0e:62:12:54:53:cd:22:f0:b5:c3:4e:2f:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        b3:27:ca:9a:db:16:ab:e7:20:e3:e9:77:b4:f3:9c:94:
        13:f0:e7:d6:9d:0b:c4:a5:6e:9c:1d:5b:aa:cd:56:49:
        2a:3e:4d:8b:61:61:58:a5:b3:7c:5f:6e:df:d2:8f:c0:
        ed:fd:fc:03:4f:58:65:2f:4a:9d:82:b8:94:5d:4a:c7:
        85:5c:7b:7f:ae:1b:3d:9e:cd:2d:49:dd:b9:ae:9f:b4:
        a7:66:9e:55:aa:fd:2c:49:73:7c:c0:cb:37:dc:71:02:
        c7:d2:c8:1d:8c:92:78:3f:9d:51:e3:c7:7d:31:bc:3c:
        08:35:67:17:12:71:56:c5:60:60:5d:83:c3:f0:0e:63:
        94:57:d6:a1:1f:75:2f:57:40:7b:bf:a4:25:01:df:80:
        44:46:21:1d:32:8b:e7:eb:1f:d7:d8:d6:0e:2d:7b:c6:
        a7:8d:65:9f:ca:78:50:dc:09:4b:e9:9b:bb:76:c2:81:
        d3:a9:83:4e:40:b1:01:2a:6f:64:15:65:7f:1e:fb:47:
        00:8b:68:03:02:da:14:fd:e0:23:71:0f:55:eb:01:65:
        04:1e:22:e6:02:e3:8d:25:38:59:4d:70:d6:5f:bb:ec:
        92:0c:2e:59:d0:6a:f3:a2:b0:af:b6:ee:4c:1c:bd:ba:
        ee:9b:0d:57:91:a6:6e:98:5b:e9:f4:99:59:f3:8c:20
    Fingerprint (SHA-256):
        54:CF:E9:F2:FE:8B:40:80:16:7C:CF:56:46:29:EF:70:D3:DE:12:7B:ED:14:9F:FE:7C:03:F1:5F:EA:9E:EF:56
    Fingerprint (SHA1):
        C5:B9:18:A1:AE:7B:9B:A0:9B:53:62:21:DC:67:A2:DC:2C:77:A8:63

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3787: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3788: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185160 (0x1ef22308)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 18:58:04 2017
            Not After : Thu May 19 18:58:04 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ef:30:67:02:60:bf:53:3d:e4:33:a3:72:38:98:25:96:
                    8f:8d:34:92:9c:ac:66:05:99:d9:e8:58:97:a4:5b:b5:
                    bd:b1:ff:8f:0e:28:34:b7:6e:6b:ac:4a:89:61:4f:07:
                    16:82:61:17:b9:e2:35:bf:e3:95:9d:01:44:4c:1f:48:
                    ea:ce:21:37:c6:f6:a3:83:74:85:67:b2:ae:5a:24:f6:
                    6b:47:cd:b0:51:d8:e8:03:ef:2a:e6:4a:96:5d:d4:7a:
                    e4:61:d5:4e:3f:58:56:55:3d:91:1b:e6:42:d3:0b:6d:
                    9b:15:d0:dc:ac:91:1a:60:f8:3d:ab:00:e9:93:03:67:
                    c3:52:33:16:51:c2:4a:cd:7a:b8:f6:71:16:2d:86:6f:
                    83:e6:cd:6d:92:5b:29:3e:06:a1:e4:48:6f:fe:34:a4:
                    41:6f:54:b6:e0:a9:24:07:13:e3:68:bf:00:0a:51:52:
                    1d:b1:0e:ae:b9:ce:cf:ec:36:45:0f:e5:bc:34:6b:df:
                    7e:c9:30:f8:58:19:89:25:29:ec:4e:4c:1a:24:cd:17:
                    9d:00:bb:3c:3a:e9:f5:4c:f6:eb:b4:25:c2:94:f4:59:
                    3d:03:6c:7f:8d:62:3a:47:3d:bb:73:47:66:0e:f5:49:
                    02:da:0b:45:6c:00:ae:b8:75:8e:a5:c3:ff:38:b1:b3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        62:55:1a:a9:41:89:7d:b5:f4:a4:59:02:4c:d8:a3:91:
        66:14:0a:3a:36:c0:eb:cd:bd:8e:54:82:d1:82:bb:8c:
        4d:e1:74:a2:23:c1:a0:91:b0:62:c9:f8:81:9a:3b:63:
        da:06:02:42:ba:25:dd:42:f7:3d:61:4d:bb:cb:16:f2:
        36:87:3c:86:d4:e3:bc:7a:88:11:ec:e3:6c:e9:db:19:
        2b:e0:84:68:69:a8:3e:e7:1f:a9:d9:aa:f1:34:71:c8:
        07:be:3b:bf:b3:94:db:c9:0f:58:06:a0:d8:d6:69:cb:
        4b:c4:25:0b:44:a9:96:e1:c4:13:68:95:e9:6d:19:67:
        83:9f:73:fb:23:49:cf:67:b5:56:c1:94:ef:90:9b:b1:
        fe:03:06:36:1a:ee:4a:30:7f:2f:0d:a0:4c:cc:37:ef:
        43:4c:cc:60:ad:1a:82:17:af:eb:10:f4:5c:1f:16:36:
        ca:ad:6e:5c:1c:d4:7a:cf:8c:c2:fa:40:40:da:76:ef:
        36:bb:9e:c5:ad:b5:bb:9d:b0:b2:aa:d1:4e:93:6d:d7:
        e3:54:21:f5:2d:7a:dd:be:ef:0d:19:41:c9:d0:76:a9:
        67:0e:39:9b:f2:80:f3:25:5c:a7:b5:15:be:72:d6:4d:
        c0:ab:18:85:b7:f6:d7:f7:6b:bb:a5:b6:5b:95:5a:43
    Fingerprint (SHA-256):
        42:3D:79:44:E7:F4:F0:9A:EE:ED:0E:1A:3E:06:B2:D3:AD:A9:AA:84:78:69:E1:05:14:F0:6A:F2:B7:D4:E8:01
    Fingerprint (SHA1):
        30:1A:45:F5:D9:35:68:BC:DA:E2:B9:42:E4:FD:5C:46:E5:08:C7:F7

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3789: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3790: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185161 (0x1ef22309)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 18:58:12 2017
            Not After : Thu May 19 18:58:12 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9c:f8:cc:96:0f:b7:3e:a2:df:ef:39:f6:fb:3a:ba:75:
                    1d:5c:4a:76:00:e5:eb:71:36:48:b7:be:a7:5b:ac:6a:
                    4d:18:8e:67:4b:4f:35:46:16:3b:97:c7:85:cb:74:54:
                    c7:5e:85:fe:ad:88:13:ba:52:9b:00:20:95:ff:7d:8f:
                    eb:2b:f0:63:28:7f:76:f1:f3:b7:42:cd:5f:05:2a:4d:
                    db:ba:08:e8:4f:5c:03:09:a7:43:d3:29:72:bc:53:a3:
                    7f:68:b3:79:3d:b8:6d:3a:2f:30:ef:35:75:fd:95:3f:
                    4f:10:c8:ff:d0:6e:e6:dc:86:7d:65:4b:7c:c3:4e:1d:
                    28:bd:26:71:bd:2c:49:ab:9b:c0:85:db:f3:c5:3c:07:
                    24:bd:ba:78:bd:65:cb:2c:0b:37:f3:b3:72:d6:f3:8f:
                    fd:46:16:d7:f1:0f:0d:ef:66:8d:8f:e0:c7:e4:02:1a:
                    38:b9:b3:b0:ed:cd:5e:ca:5c:23:00:cc:22:a7:34:6d:
                    f4:10:a0:03:22:ad:74:1d:cf:5a:d6:19:bf:d8:87:62:
                    3a:3c:b9:2d:e5:54:e1:45:2f:14:85:23:b1:d7:e4:a0:
                    cb:9c:fc:80:58:c2:b3:20:2e:70:c3:92:62:c0:99:a4:
                    47:05:3d:85:71:ec:34:d5:8b:b8:6d:41:e3:3c:f9:e7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        92:20:64:e8:f7:80:35:d0:52:b3:34:ae:19:d1:99:44:
        e7:48:1b:86:0e:ac:96:b8:13:cd:97:5d:bd:9d:c0:6f:
        51:a6:3e:85:bb:c7:7b:7b:08:11:51:c4:d9:4f:71:50:
        0e:f5:8b:9b:b8:63:94:28:e8:6e:f5:86:5c:78:73:44:
        60:f7:70:24:69:dc:50:e4:03:c7:4d:2b:1a:31:c3:b2:
        82:5a:6b:f7:da:56:e1:5f:ab:13:ba:32:cb:50:c7:0f:
        bc:74:a7:ce:de:71:04:d6:1d:58:1b:9a:80:d6:3d:e3:
        35:90:48:bd:8e:3f:fc:88:38:a3:fb:a4:82:3e:ce:f7:
        34:7b:ba:76:8c:3a:23:82:80:4d:f0:0c:40:28:68:5b:
        e4:d3:72:95:43:17:c8:5b:5f:0b:51:f8:59:13:7b:ad:
        7e:40:37:55:25:22:10:1b:d0:1d:38:91:1f:86:84:8c:
        eb:96:0e:d5:dd:da:da:06:d2:e0:f8:9a:a2:8d:09:ef:
        58:92:41:b5:ce:ab:22:0b:6a:d6:ab:ac:95:27:4c:6c:
        84:2a:a1:19:5a:87:09:03:c5:c2:f0:bf:8d:4e:f6:80:
        07:0e:7c:6c:90:6b:03:58:5d:f6:70:fe:69:f5:7e:2e:
        1d:b1:27:fe:01:46:1b:88:0f:b9:88:40:ac:0f:fc:f1
    Fingerprint (SHA-256):
        AE:A4:A9:A2:11:DD:DD:45:10:DF:DC:DB:22:5E:50:91:F8:21:56:9C:3D:64:02:E9:3E:C7:AF:A9:C0:18:5F:45
    Fingerprint (SHA1):
        39:1B:52:CF:05:D6:92:11:0D:5A:EA:FD:13:7B:66:51:26:E2:9C:3B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #3791: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3792: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3793: Extension2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185163 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3794: Extension2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3795: Extension2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3796: Extension2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3797: Extension2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 519185164   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3798: Extension2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3799: Extension2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3800: Extension2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3801: Extension2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 519185165   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3802: Extension2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3803: Extension2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #3804: Extension2: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o User1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3805: Extension2: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 519185166   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3806: Extension2: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3807: Extension2: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #3808: Extension2: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o User2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3809: Extension2: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 519185167   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3810: Extension2: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3811: Extension2: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3812: Extension2: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185163 (0x1ef2230b)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 18:58:31 2017
            Not After : Thu May 19 18:58:31 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c7:c0:6d:f7:54:d5:3f:40:62:9e:d9:49:d9:46:6c:f2:
                    2e:a9:82:ef:da:04:8d:ac:49:a6:24:cd:94:15:d4:2d:
                    60:ea:6d:4c:fb:4c:63:07:c8:e0:ea:d8:db:2d:61:a1:
                    3b:fd:30:4f:b6:6d:c9:56:59:39:df:69:11:ca:c3:7a:
                    80:9b:5b:bd:a1:34:22:32:ce:ef:3a:29:2b:a7:c3:02:
                    ef:aa:57:73:87:d5:6e:91:9f:51:a5:23:d5:0c:e4:2a:
                    26:74:25:f8:01:4d:58:bd:15:7d:92:b9:9e:60:74:d5:
                    0c:db:1f:a6:28:19:a9:a9:c7:aa:db:36:c8:d2:4e:f5:
                    9b:5f:6a:bb:63:49:22:6a:e4:6d:df:87:1d:e9:46:8c:
                    6f:5d:53:e9:5a:6a:94:38:c8:2c:c4:5b:40:d5:f8:a9:
                    c1:1c:8c:4a:48:c8:64:9a:94:4b:6b:80:19:ac:5b:9e:
                    2d:2c:58:90:6a:1d:65:bb:a8:c7:dc:b1:8d:3e:c4:9a:
                    8f:5f:cd:8c:08:0a:2e:67:8a:b7:c3:fc:68:a0:78:67:
                    61:b1:79:24:cd:e1:f4:c2:69:18:ff:33:51:83:00:a1:
                    78:5e:05:51:40:67:7c:96:db:a6:1a:be:12:49:f1:02:
                    7b:27:c2:c0:e8:56:47:8e:b5:f3:e9:5a:68:b0:3e:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1f:b4:6e:aa:d8:1e:5f:85:9a:f7:83:f0:81:67:61:7d:
        fd:4f:6c:81:c1:bc:8b:fc:9e:22:36:39:08:35:6d:a6:
        71:0a:d7:fd:77:18:3a:0f:2f:f8:97:1b:45:20:eb:7c:
        e7:43:7b:7d:5d:8d:20:52:6f:99:03:6b:32:3f:e4:66:
        f0:10:73:94:41:4b:63:cd:77:27:7b:3d:94:89:fc:d6:
        a8:ac:34:35:8d:16:e4:60:3e:f8:a9:5a:29:ad:bf:01:
        73:3b:a3:72:6a:30:83:97:d5:ad:05:de:fd:98:bd:cc:
        e0:a1:9a:46:7c:99:78:b3:2e:75:a2:5a:fd:88:9e:42:
        48:9c:7f:06:19:12:0b:94:1d:41:53:26:3b:11:eb:17:
        15:1e:ed:53:b8:83:c0:92:99:20:fe:24:41:b8:81:0c:
        51:98:fa:25:6e:1c:06:cc:4e:79:12:0c:50:73:0a:84:
        44:47:45:84:47:d8:6c:2e:90:4f:64:c0:0c:12:cc:37:
        5e:bd:ab:2d:30:5e:24:f6:da:d5:ae:80:08:80:1b:c8:
        ec:30:6d:4e:22:51:de:66:28:c5:17:9d:24:f4:c5:68:
        d8:da:19:46:47:6f:2d:e7:f4:cf:45:42:81:8b:ef:3b:
        ba:6e:47:ef:ee:3e:b5:7f:41:f1:be:11:4a:be:b8:88
    Fingerprint (SHA-256):
        94:40:3D:B6:DF:A4:A3:FF:31:2D:11:11:08:60:D8:A1:BE:90:D2:80:6B:CF:4D:32:74:A1:5C:CE:0F:4D:43:90
    Fingerprint (SHA1):
        6B:8A:F5:C0:D5:A4:7F:EF:1C:71:F2:7E:F1:B3:E5:3B:54:88:DC:00


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3813: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3814: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185164 (0x1ef2230c)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 18:58:45 2017
            Not After : Thu May 19 18:58:45 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:f1:13:b2:6d:ed:cc:61:9e:d7:38:1b:f6:0b:61:b2:
                    11:c7:de:ba:f1:6f:36:b6:94:c5:9a:c1:ca:a6:c5:b0:
                    bf:97:23:45:a1:13:fe:6e:91:b9:83:ba:60:52:df:0e:
                    96:9d:bb:fb:e3:1b:21:58:99:75:3c:85:7b:bd:70:a3:
                    02:b2:fe:79:94:0a:dc:45:2b:88:bf:93:73:7b:00:a5:
                    4a:38:3c:16:d9:56:2f:f6:99:4e:8b:c2:a2:bd:56:3e:
                    51:bb:f0:42:92:a2:31:54:8b:b1:e5:45:2f:a0:d7:a2:
                    c5:11:de:28:3e:0d:61:41:94:22:a4:8c:bf:43:e8:38:
                    96:56:b9:c6:78:b3:ec:20:ba:73:f9:13:f8:9b:ed:de:
                    91:89:a5:9b:f8:d8:c4:2c:e9:7f:d7:72:5e:5a:32:9a:
                    0d:de:53:7a:6a:e7:7a:60:7c:fa:9e:1a:8a:e9:56:74:
                    fb:01:c6:de:ce:8a:b4:2d:5d:d2:2a:c8:87:38:70:90:
                    79:e1:e0:c7:f8:34:50:a2:ba:15:bf:82:06:b5:55:d2:
                    3c:49:5a:32:bf:3b:34:4d:ea:a8:98:0f:d7:38:94:7f:
                    ba:14:f7:b1:a8:f3:25:6d:39:89:d0:f5:a7:7c:cd:50:
                    fa:0d:25:77:38:37:55:72:c1:20:3a:91:c7:b5:da:3b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        79:9c:47:57:34:aa:20:e9:ca:77:f0:7c:d0:aa:4e:69:
        25:b3:41:f0:0e:14:7c:5d:29:19:35:b0:88:74:fe:7b:
        6d:f9:ff:c8:7d:a9:51:74:28:af:05:59:03:d0:77:e8:
        d8:86:99:28:de:d8:de:d2:c2:83:2b:c1:9c:2c:a4:4c:
        ef:64:9e:62:cf:ca:6d:b3:d3:33:a3:52:32:5a:1f:14:
        46:39:bf:2b:b3:dc:6c:0e:37:89:6a:71:bf:1a:ff:8a:
        ba:c5:dd:4d:ad:65:87:2b:8f:83:b3:0a:8e:2b:9f:35:
        69:7c:b0:9d:cd:9e:28:4f:e1:98:8d:e2:48:4f:5d:31:
        aa:06:75:59:3e:b5:f4:36:ed:5d:61:bb:59:51:e9:77:
        70:f7:7d:cf:7e:b7:a5:25:51:74:a6:59:e3:84:49:f9:
        f5:48:2e:32:cc:9b:c1:de:fd:f7:ad:1a:73:65:bb:02:
        68:0a:3a:06:87:3d:0f:d9:f6:92:c9:49:b0:2e:8c:27:
        70:17:0d:33:db:19:9c:75:75:9a:84:05:f0:ee:35:45:
        32:f9:fc:02:a2:09:89:13:a9:24:e6:ee:25:71:c7:22:
        69:2c:6f:24:05:e3:18:1f:cd:c2:c9:fd:74:b7:2c:2d:
        36:bb:f4:bf:94:35:15:cd:0f:d7:79:a7:a9:59:be:cc
    Fingerprint (SHA-256):
        F4:8A:01:90:B0:AE:DE:A6:9A:99:9E:FF:F6:2F:8A:69:8F:C0:BA:CB:87:BE:D7:F4:4C:7C:3B:EE:62:1D:53:2E
    Fingerprint (SHA1):
        AD:40:CA:DE:22:46:9E:8C:72:F9:CB:F0:A2:3E:3E:13:57:97:DA:55


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3815: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3816: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185165 (0x1ef2230d)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 18:58:53 2017
            Not After : Thu May 19 18:58:53 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:6e:7e:7d:a3:0d:30:b1:0f:98:dc:1c:6c:c8:e8:ad:
                    3a:f1:8f:ef:e4:7d:63:ba:7a:56:c7:9a:9d:9a:92:3f:
                    ea:6f:68:83:8e:f6:5d:39:6e:7c:d1:d7:d2:98:2a:b1:
                    fe:5d:de:16:bf:f7:8a:5b:52:87:14:86:59:65:bd:4e:
                    24:20:cf:7f:37:fd:85:2d:73:91:7b:76:c0:1e:8a:b3:
                    52:53:15:53:ef:2a:ca:35:53:5f:5e:0e:b5:02:f3:3c:
                    83:a1:b9:a5:62:56:e2:53:36:0f:9b:75:e5:52:05:9e:
                    bf:fb:7f:58:7d:7a:03:f2:0f:aa:41:d3:02:aa:61:3a:
                    94:82:be:08:d9:c4:57:91:7b:eb:4a:3f:c5:97:6c:fa:
                    08:29:f5:b5:c4:7b:24:7f:6b:b2:55:58:5f:84:0f:f5:
                    da:1e:fe:4e:5a:c0:0d:d8:15:12:fd:3c:ec:5c:76:18:
                    5f:37:6b:d0:42:24:3e:f3:8b:a5:a1:28:a8:cb:af:8b:
                    e1:dd:cd:5d:d5:22:06:85:d2:e5:c0:da:51:0c:67:57:
                    70:8c:ca:f1:94:c0:49:60:65:bd:56:1b:ba:d8:58:ef:
                    30:62:87:21:af:86:b7:6c:f2:8f:4c:0d:ad:e8:28:30:
                    de:63:52:5b:4f:46:da:66:4b:c1:c7:07:bb:03:7c:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        92:a2:dd:77:8f:28:a8:b0:d4:1f:43:b8:40:78:3b:0c:
        ca:4a:2b:3e:4a:ad:fb:c7:17:b5:f6:50:3b:84:96:8f:
        90:ee:5a:15:9a:02:f2:da:2c:1a:98:f8:2f:bc:db:e9:
        d5:9a:6b:fd:f7:5b:a3:88:6d:3d:54:5b:21:10:2c:02:
        51:00:ef:cb:87:44:de:7d:e9:ec:4b:c4:3f:22:30:1b:
        96:07:51:bb:09:91:3f:80:fc:d5:d0:ae:d5:81:01:49:
        a7:66:08:c1:d3:cd:1b:1e:71:17:8c:26:ec:fb:0c:ab:
        87:50:9c:11:bb:64:3a:81:1a:a4:56:12:10:0b:a3:3c:
        e6:4f:62:01:a8:fb:30:13:e7:b9:d6:bf:05:78:df:6b:
        9d:ab:c2:97:8c:1a:40:d3:26:0f:25:fe:4d:2f:40:02:
        ef:6b:e6:b3:9b:0d:33:bb:71:3a:1e:61:fa:72:d1:6e:
        94:f6:28:76:11:17:97:32:f1:16:6b:90:b3:09:4d:13:
        09:c1:17:4e:c5:05:de:5d:a4:39:58:54:83:1f:48:69:
        dc:54:6a:f6:9f:21:da:27:c1:17:b6:22:1c:b1:85:e5:
        2f:55:2b:36:7d:4b:3d:d3:1e:a5:08:08:32:15:b1:30:
        40:ee:02:27:4f:e2:30:24:ee:60:36:b4:de:fb:4e:b1
    Fingerprint (SHA-256):
        62:EB:E5:D0:3D:59:69:FD:93:95:C0:4E:52:F1:90:76:BB:C4:21:A4:04:EA:40:8B:1A:31:CB:F3:69:00:D5:8D
    Fingerprint (SHA1):
        B6:FA:66:B7:8F:B1:34:CF:D3:C8:80:E2:58:56:E6:F4:7B:82:4A:C7


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3817: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3818: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3819: Extension2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3820: Extension2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3821: Extension2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185163 (0x1ef2230b)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 18:58:31 2017
            Not After : Thu May 19 18:58:31 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c7:c0:6d:f7:54:d5:3f:40:62:9e:d9:49:d9:46:6c:f2:
                    2e:a9:82:ef:da:04:8d:ac:49:a6:24:cd:94:15:d4:2d:
                    60:ea:6d:4c:fb:4c:63:07:c8:e0:ea:d8:db:2d:61:a1:
                    3b:fd:30:4f:b6:6d:c9:56:59:39:df:69:11:ca:c3:7a:
                    80:9b:5b:bd:a1:34:22:32:ce:ef:3a:29:2b:a7:c3:02:
                    ef:aa:57:73:87:d5:6e:91:9f:51:a5:23:d5:0c:e4:2a:
                    26:74:25:f8:01:4d:58:bd:15:7d:92:b9:9e:60:74:d5:
                    0c:db:1f:a6:28:19:a9:a9:c7:aa:db:36:c8:d2:4e:f5:
                    9b:5f:6a:bb:63:49:22:6a:e4:6d:df:87:1d:e9:46:8c:
                    6f:5d:53:e9:5a:6a:94:38:c8:2c:c4:5b:40:d5:f8:a9:
                    c1:1c:8c:4a:48:c8:64:9a:94:4b:6b:80:19:ac:5b:9e:
                    2d:2c:58:90:6a:1d:65:bb:a8:c7:dc:b1:8d:3e:c4:9a:
                    8f:5f:cd:8c:08:0a:2e:67:8a:b7:c3:fc:68:a0:78:67:
                    61:b1:79:24:cd:e1:f4:c2:69:18:ff:33:51:83:00:a1:
                    78:5e:05:51:40:67:7c:96:db:a6:1a:be:12:49:f1:02:
                    7b:27:c2:c0:e8:56:47:8e:b5:f3:e9:5a:68:b0:3e:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1f:b4:6e:aa:d8:1e:5f:85:9a:f7:83:f0:81:67:61:7d:
        fd:4f:6c:81:c1:bc:8b:fc:9e:22:36:39:08:35:6d:a6:
        71:0a:d7:fd:77:18:3a:0f:2f:f8:97:1b:45:20:eb:7c:
        e7:43:7b:7d:5d:8d:20:52:6f:99:03:6b:32:3f:e4:66:
        f0:10:73:94:41:4b:63:cd:77:27:7b:3d:94:89:fc:d6:
        a8:ac:34:35:8d:16:e4:60:3e:f8:a9:5a:29:ad:bf:01:
        73:3b:a3:72:6a:30:83:97:d5:ad:05:de:fd:98:bd:cc:
        e0:a1:9a:46:7c:99:78:b3:2e:75:a2:5a:fd:88:9e:42:
        48:9c:7f:06:19:12:0b:94:1d:41:53:26:3b:11:eb:17:
        15:1e:ed:53:b8:83:c0:92:99:20:fe:24:41:b8:81:0c:
        51:98:fa:25:6e:1c:06:cc:4e:79:12:0c:50:73:0a:84:
        44:47:45:84:47:d8:6c:2e:90:4f:64:c0:0c:12:cc:37:
        5e:bd:ab:2d:30:5e:24:f6:da:d5:ae:80:08:80:1b:c8:
        ec:30:6d:4e:22:51:de:66:28:c5:17:9d:24:f4:c5:68:
        d8:da:19:46:47:6f:2d:e7:f4:cf:45:42:81:8b:ef:3b:
        ba:6e:47:ef:ee:3e:b5:7f:41:f1:be:11:4a:be:b8:88
    Fingerprint (SHA-256):
        94:40:3D:B6:DF:A4:A3:FF:31:2D:11:11:08:60:D8:A1:BE:90:D2:80:6B:CF:4D:32:74:A1:5C:CE:0F:4D:43:90
    Fingerprint (SHA1):
        6B:8A:F5:C0:D5:A4:7F:EF:1C:71:F2:7E:F1:B3:E5:3B:54:88:DC:00

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3822: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3823: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185164 (0x1ef2230c)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 18:58:45 2017
            Not After : Thu May 19 18:58:45 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:f1:13:b2:6d:ed:cc:61:9e:d7:38:1b:f6:0b:61:b2:
                    11:c7:de:ba:f1:6f:36:b6:94:c5:9a:c1:ca:a6:c5:b0:
                    bf:97:23:45:a1:13:fe:6e:91:b9:83:ba:60:52:df:0e:
                    96:9d:bb:fb:e3:1b:21:58:99:75:3c:85:7b:bd:70:a3:
                    02:b2:fe:79:94:0a:dc:45:2b:88:bf:93:73:7b:00:a5:
                    4a:38:3c:16:d9:56:2f:f6:99:4e:8b:c2:a2:bd:56:3e:
                    51:bb:f0:42:92:a2:31:54:8b:b1:e5:45:2f:a0:d7:a2:
                    c5:11:de:28:3e:0d:61:41:94:22:a4:8c:bf:43:e8:38:
                    96:56:b9:c6:78:b3:ec:20:ba:73:f9:13:f8:9b:ed:de:
                    91:89:a5:9b:f8:d8:c4:2c:e9:7f:d7:72:5e:5a:32:9a:
                    0d:de:53:7a:6a:e7:7a:60:7c:fa:9e:1a:8a:e9:56:74:
                    fb:01:c6:de:ce:8a:b4:2d:5d:d2:2a:c8:87:38:70:90:
                    79:e1:e0:c7:f8:34:50:a2:ba:15:bf:82:06:b5:55:d2:
                    3c:49:5a:32:bf:3b:34:4d:ea:a8:98:0f:d7:38:94:7f:
                    ba:14:f7:b1:a8:f3:25:6d:39:89:d0:f5:a7:7c:cd:50:
                    fa:0d:25:77:38:37:55:72:c1:20:3a:91:c7:b5:da:3b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        79:9c:47:57:34:aa:20:e9:ca:77:f0:7c:d0:aa:4e:69:
        25:b3:41:f0:0e:14:7c:5d:29:19:35:b0:88:74:fe:7b:
        6d:f9:ff:c8:7d:a9:51:74:28:af:05:59:03:d0:77:e8:
        d8:86:99:28:de:d8:de:d2:c2:83:2b:c1:9c:2c:a4:4c:
        ef:64:9e:62:cf:ca:6d:b3:d3:33:a3:52:32:5a:1f:14:
        46:39:bf:2b:b3:dc:6c:0e:37:89:6a:71:bf:1a:ff:8a:
        ba:c5:dd:4d:ad:65:87:2b:8f:83:b3:0a:8e:2b:9f:35:
        69:7c:b0:9d:cd:9e:28:4f:e1:98:8d:e2:48:4f:5d:31:
        aa:06:75:59:3e:b5:f4:36:ed:5d:61:bb:59:51:e9:77:
        70:f7:7d:cf:7e:b7:a5:25:51:74:a6:59:e3:84:49:f9:
        f5:48:2e:32:cc:9b:c1:de:fd:f7:ad:1a:73:65:bb:02:
        68:0a:3a:06:87:3d:0f:d9:f6:92:c9:49:b0:2e:8c:27:
        70:17:0d:33:db:19:9c:75:75:9a:84:05:f0:ee:35:45:
        32:f9:fc:02:a2:09:89:13:a9:24:e6:ee:25:71:c7:22:
        69:2c:6f:24:05:e3:18:1f:cd:c2:c9:fd:74:b7:2c:2d:
        36:bb:f4:bf:94:35:15:cd:0f:d7:79:a7:a9:59:be:cc
    Fingerprint (SHA-256):
        F4:8A:01:90:B0:AE:DE:A6:9A:99:9E:FF:F6:2F:8A:69:8F:C0:BA:CB:87:BE:D7:F4:4C:7C:3B:EE:62:1D:53:2E
    Fingerprint (SHA1):
        AD:40:CA:DE:22:46:9E:8C:72:F9:CB:F0:A2:3E:3E:13:57:97:DA:55

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3824: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3825: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185165 (0x1ef2230d)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 18:58:53 2017
            Not After : Thu May 19 18:58:53 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:6e:7e:7d:a3:0d:30:b1:0f:98:dc:1c:6c:c8:e8:ad:
                    3a:f1:8f:ef:e4:7d:63:ba:7a:56:c7:9a:9d:9a:92:3f:
                    ea:6f:68:83:8e:f6:5d:39:6e:7c:d1:d7:d2:98:2a:b1:
                    fe:5d:de:16:bf:f7:8a:5b:52:87:14:86:59:65:bd:4e:
                    24:20:cf:7f:37:fd:85:2d:73:91:7b:76:c0:1e:8a:b3:
                    52:53:15:53:ef:2a:ca:35:53:5f:5e:0e:b5:02:f3:3c:
                    83:a1:b9:a5:62:56:e2:53:36:0f:9b:75:e5:52:05:9e:
                    bf:fb:7f:58:7d:7a:03:f2:0f:aa:41:d3:02:aa:61:3a:
                    94:82:be:08:d9:c4:57:91:7b:eb:4a:3f:c5:97:6c:fa:
                    08:29:f5:b5:c4:7b:24:7f:6b:b2:55:58:5f:84:0f:f5:
                    da:1e:fe:4e:5a:c0:0d:d8:15:12:fd:3c:ec:5c:76:18:
                    5f:37:6b:d0:42:24:3e:f3:8b:a5:a1:28:a8:cb:af:8b:
                    e1:dd:cd:5d:d5:22:06:85:d2:e5:c0:da:51:0c:67:57:
                    70:8c:ca:f1:94:c0:49:60:65:bd:56:1b:ba:d8:58:ef:
                    30:62:87:21:af:86:b7:6c:f2:8f:4c:0d:ad:e8:28:30:
                    de:63:52:5b:4f:46:da:66:4b:c1:c7:07:bb:03:7c:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        92:a2:dd:77:8f:28:a8:b0:d4:1f:43:b8:40:78:3b:0c:
        ca:4a:2b:3e:4a:ad:fb:c7:17:b5:f6:50:3b:84:96:8f:
        90:ee:5a:15:9a:02:f2:da:2c:1a:98:f8:2f:bc:db:e9:
        d5:9a:6b:fd:f7:5b:a3:88:6d:3d:54:5b:21:10:2c:02:
        51:00:ef:cb:87:44:de:7d:e9:ec:4b:c4:3f:22:30:1b:
        96:07:51:bb:09:91:3f:80:fc:d5:d0:ae:d5:81:01:49:
        a7:66:08:c1:d3:cd:1b:1e:71:17:8c:26:ec:fb:0c:ab:
        87:50:9c:11:bb:64:3a:81:1a:a4:56:12:10:0b:a3:3c:
        e6:4f:62:01:a8:fb:30:13:e7:b9:d6:bf:05:78:df:6b:
        9d:ab:c2:97:8c:1a:40:d3:26:0f:25:fe:4d:2f:40:02:
        ef:6b:e6:b3:9b:0d:33:bb:71:3a:1e:61:fa:72:d1:6e:
        94:f6:28:76:11:17:97:32:f1:16:6b:90:b3:09:4d:13:
        09:c1:17:4e:c5:05:de:5d:a4:39:58:54:83:1f:48:69:
        dc:54:6a:f6:9f:21:da:27:c1:17:b6:22:1c:b1:85:e5:
        2f:55:2b:36:7d:4b:3d:d3:1e:a5:08:08:32:15:b1:30:
        40:ee:02:27:4f:e2:30:24:ee:60:36:b4:de:fb:4e:b1
    Fingerprint (SHA-256):
        62:EB:E5:D0:3D:59:69:FD:93:95:C0:4E:52:F1:90:76:BB:C4:21:A4:04:EA:40:8B:1A:31:CB:F3:69:00:D5:8D
    Fingerprint (SHA1):
        B6:FA:66:B7:8F:B1:34:CF:D3:C8:80:E2:58:56:E6:F4:7B:82:4A:C7

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3826: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3827: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185163 (0x1ef2230b)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 18:58:31 2017
            Not After : Thu May 19 18:58:31 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c7:c0:6d:f7:54:d5:3f:40:62:9e:d9:49:d9:46:6c:f2:
                    2e:a9:82:ef:da:04:8d:ac:49:a6:24:cd:94:15:d4:2d:
                    60:ea:6d:4c:fb:4c:63:07:c8:e0:ea:d8:db:2d:61:a1:
                    3b:fd:30:4f:b6:6d:c9:56:59:39:df:69:11:ca:c3:7a:
                    80:9b:5b:bd:a1:34:22:32:ce:ef:3a:29:2b:a7:c3:02:
                    ef:aa:57:73:87:d5:6e:91:9f:51:a5:23:d5:0c:e4:2a:
                    26:74:25:f8:01:4d:58:bd:15:7d:92:b9:9e:60:74:d5:
                    0c:db:1f:a6:28:19:a9:a9:c7:aa:db:36:c8:d2:4e:f5:
                    9b:5f:6a:bb:63:49:22:6a:e4:6d:df:87:1d:e9:46:8c:
                    6f:5d:53:e9:5a:6a:94:38:c8:2c:c4:5b:40:d5:f8:a9:
                    c1:1c:8c:4a:48:c8:64:9a:94:4b:6b:80:19:ac:5b:9e:
                    2d:2c:58:90:6a:1d:65:bb:a8:c7:dc:b1:8d:3e:c4:9a:
                    8f:5f:cd:8c:08:0a:2e:67:8a:b7:c3:fc:68:a0:78:67:
                    61:b1:79:24:cd:e1:f4:c2:69:18:ff:33:51:83:00:a1:
                    78:5e:05:51:40:67:7c:96:db:a6:1a:be:12:49:f1:02:
                    7b:27:c2:c0:e8:56:47:8e:b5:f3:e9:5a:68:b0:3e:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1f:b4:6e:aa:d8:1e:5f:85:9a:f7:83:f0:81:67:61:7d:
        fd:4f:6c:81:c1:bc:8b:fc:9e:22:36:39:08:35:6d:a6:
        71:0a:d7:fd:77:18:3a:0f:2f:f8:97:1b:45:20:eb:7c:
        e7:43:7b:7d:5d:8d:20:52:6f:99:03:6b:32:3f:e4:66:
        f0:10:73:94:41:4b:63:cd:77:27:7b:3d:94:89:fc:d6:
        a8:ac:34:35:8d:16:e4:60:3e:f8:a9:5a:29:ad:bf:01:
        73:3b:a3:72:6a:30:83:97:d5:ad:05:de:fd:98:bd:cc:
        e0:a1:9a:46:7c:99:78:b3:2e:75:a2:5a:fd:88:9e:42:
        48:9c:7f:06:19:12:0b:94:1d:41:53:26:3b:11:eb:17:
        15:1e:ed:53:b8:83:c0:92:99:20:fe:24:41:b8:81:0c:
        51:98:fa:25:6e:1c:06:cc:4e:79:12:0c:50:73:0a:84:
        44:47:45:84:47:d8:6c:2e:90:4f:64:c0:0c:12:cc:37:
        5e:bd:ab:2d:30:5e:24:f6:da:d5:ae:80:08:80:1b:c8:
        ec:30:6d:4e:22:51:de:66:28:c5:17:9d:24:f4:c5:68:
        d8:da:19:46:47:6f:2d:e7:f4:cf:45:42:81:8b:ef:3b:
        ba:6e:47:ef:ee:3e:b5:7f:41:f1:be:11:4a:be:b8:88
    Fingerprint (SHA-256):
        94:40:3D:B6:DF:A4:A3:FF:31:2D:11:11:08:60:D8:A1:BE:90:D2:80:6B:CF:4D:32:74:A1:5C:CE:0F:4D:43:90
    Fingerprint (SHA1):
        6B:8A:F5:C0:D5:A4:7F:EF:1C:71:F2:7E:F1:B3:E5:3B:54:88:DC:00

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3828: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185163 (0x1ef2230b)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 18:58:31 2017
            Not After : Thu May 19 18:58:31 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c7:c0:6d:f7:54:d5:3f:40:62:9e:d9:49:d9:46:6c:f2:
                    2e:a9:82:ef:da:04:8d:ac:49:a6:24:cd:94:15:d4:2d:
                    60:ea:6d:4c:fb:4c:63:07:c8:e0:ea:d8:db:2d:61:a1:
                    3b:fd:30:4f:b6:6d:c9:56:59:39:df:69:11:ca:c3:7a:
                    80:9b:5b:bd:a1:34:22:32:ce:ef:3a:29:2b:a7:c3:02:
                    ef:aa:57:73:87:d5:6e:91:9f:51:a5:23:d5:0c:e4:2a:
                    26:74:25:f8:01:4d:58:bd:15:7d:92:b9:9e:60:74:d5:
                    0c:db:1f:a6:28:19:a9:a9:c7:aa:db:36:c8:d2:4e:f5:
                    9b:5f:6a:bb:63:49:22:6a:e4:6d:df:87:1d:e9:46:8c:
                    6f:5d:53:e9:5a:6a:94:38:c8:2c:c4:5b:40:d5:f8:a9:
                    c1:1c:8c:4a:48:c8:64:9a:94:4b:6b:80:19:ac:5b:9e:
                    2d:2c:58:90:6a:1d:65:bb:a8:c7:dc:b1:8d:3e:c4:9a:
                    8f:5f:cd:8c:08:0a:2e:67:8a:b7:c3:fc:68:a0:78:67:
                    61:b1:79:24:cd:e1:f4:c2:69:18:ff:33:51:83:00:a1:
                    78:5e:05:51:40:67:7c:96:db:a6:1a:be:12:49:f1:02:
                    7b:27:c2:c0:e8:56:47:8e:b5:f3:e9:5a:68:b0:3e:81
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1f:b4:6e:aa:d8:1e:5f:85:9a:f7:83:f0:81:67:61:7d:
        fd:4f:6c:81:c1:bc:8b:fc:9e:22:36:39:08:35:6d:a6:
        71:0a:d7:fd:77:18:3a:0f:2f:f8:97:1b:45:20:eb:7c:
        e7:43:7b:7d:5d:8d:20:52:6f:99:03:6b:32:3f:e4:66:
        f0:10:73:94:41:4b:63:cd:77:27:7b:3d:94:89:fc:d6:
        a8:ac:34:35:8d:16:e4:60:3e:f8:a9:5a:29:ad:bf:01:
        73:3b:a3:72:6a:30:83:97:d5:ad:05:de:fd:98:bd:cc:
        e0:a1:9a:46:7c:99:78:b3:2e:75:a2:5a:fd:88:9e:42:
        48:9c:7f:06:19:12:0b:94:1d:41:53:26:3b:11:eb:17:
        15:1e:ed:53:b8:83:c0:92:99:20:fe:24:41:b8:81:0c:
        51:98:fa:25:6e:1c:06:cc:4e:79:12:0c:50:73:0a:84:
        44:47:45:84:47:d8:6c:2e:90:4f:64:c0:0c:12:cc:37:
        5e:bd:ab:2d:30:5e:24:f6:da:d5:ae:80:08:80:1b:c8:
        ec:30:6d:4e:22:51:de:66:28:c5:17:9d:24:f4:c5:68:
        d8:da:19:46:47:6f:2d:e7:f4:cf:45:42:81:8b:ef:3b:
        ba:6e:47:ef:ee:3e:b5:7f:41:f1:be:11:4a:be:b8:88
    Fingerprint (SHA-256):
        94:40:3D:B6:DF:A4:A3:FF:31:2D:11:11:08:60:D8:A1:BE:90:D2:80:6B:CF:4D:32:74:A1:5C:CE:0F:4D:43:90
    Fingerprint (SHA1):
        6B:8A:F5:C0:D5:A4:7F:EF:1C:71:F2:7E:F1:B3:E5:3B:54:88:DC:00

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3829: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185164 (0x1ef2230c)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 18:58:45 2017
            Not After : Thu May 19 18:58:45 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:f1:13:b2:6d:ed:cc:61:9e:d7:38:1b:f6:0b:61:b2:
                    11:c7:de:ba:f1:6f:36:b6:94:c5:9a:c1:ca:a6:c5:b0:
                    bf:97:23:45:a1:13:fe:6e:91:b9:83:ba:60:52:df:0e:
                    96:9d:bb:fb:e3:1b:21:58:99:75:3c:85:7b:bd:70:a3:
                    02:b2:fe:79:94:0a:dc:45:2b:88:bf:93:73:7b:00:a5:
                    4a:38:3c:16:d9:56:2f:f6:99:4e:8b:c2:a2:bd:56:3e:
                    51:bb:f0:42:92:a2:31:54:8b:b1:e5:45:2f:a0:d7:a2:
                    c5:11:de:28:3e:0d:61:41:94:22:a4:8c:bf:43:e8:38:
                    96:56:b9:c6:78:b3:ec:20:ba:73:f9:13:f8:9b:ed:de:
                    91:89:a5:9b:f8:d8:c4:2c:e9:7f:d7:72:5e:5a:32:9a:
                    0d:de:53:7a:6a:e7:7a:60:7c:fa:9e:1a:8a:e9:56:74:
                    fb:01:c6:de:ce:8a:b4:2d:5d:d2:2a:c8:87:38:70:90:
                    79:e1:e0:c7:f8:34:50:a2:ba:15:bf:82:06:b5:55:d2:
                    3c:49:5a:32:bf:3b:34:4d:ea:a8:98:0f:d7:38:94:7f:
                    ba:14:f7:b1:a8:f3:25:6d:39:89:d0:f5:a7:7c:cd:50:
                    fa:0d:25:77:38:37:55:72:c1:20:3a:91:c7:b5:da:3b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        79:9c:47:57:34:aa:20:e9:ca:77:f0:7c:d0:aa:4e:69:
        25:b3:41:f0:0e:14:7c:5d:29:19:35:b0:88:74:fe:7b:
        6d:f9:ff:c8:7d:a9:51:74:28:af:05:59:03:d0:77:e8:
        d8:86:99:28:de:d8:de:d2:c2:83:2b:c1:9c:2c:a4:4c:
        ef:64:9e:62:cf:ca:6d:b3:d3:33:a3:52:32:5a:1f:14:
        46:39:bf:2b:b3:dc:6c:0e:37:89:6a:71:bf:1a:ff:8a:
        ba:c5:dd:4d:ad:65:87:2b:8f:83:b3:0a:8e:2b:9f:35:
        69:7c:b0:9d:cd:9e:28:4f:e1:98:8d:e2:48:4f:5d:31:
        aa:06:75:59:3e:b5:f4:36:ed:5d:61:bb:59:51:e9:77:
        70:f7:7d:cf:7e:b7:a5:25:51:74:a6:59:e3:84:49:f9:
        f5:48:2e:32:cc:9b:c1:de:fd:f7:ad:1a:73:65:bb:02:
        68:0a:3a:06:87:3d:0f:d9:f6:92:c9:49:b0:2e:8c:27:
        70:17:0d:33:db:19:9c:75:75:9a:84:05:f0:ee:35:45:
        32:f9:fc:02:a2:09:89:13:a9:24:e6:ee:25:71:c7:22:
        69:2c:6f:24:05:e3:18:1f:cd:c2:c9:fd:74:b7:2c:2d:
        36:bb:f4:bf:94:35:15:cd:0f:d7:79:a7:a9:59:be:cc
    Fingerprint (SHA-256):
        F4:8A:01:90:B0:AE:DE:A6:9A:99:9E:FF:F6:2F:8A:69:8F:C0:BA:CB:87:BE:D7:F4:4C:7C:3B:EE:62:1D:53:2E
    Fingerprint (SHA1):
        AD:40:CA:DE:22:46:9E:8C:72:F9:CB:F0:A2:3E:3E:13:57:97:DA:55

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3830: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185164 (0x1ef2230c)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 18:58:45 2017
            Not After : Thu May 19 18:58:45 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:f1:13:b2:6d:ed:cc:61:9e:d7:38:1b:f6:0b:61:b2:
                    11:c7:de:ba:f1:6f:36:b6:94:c5:9a:c1:ca:a6:c5:b0:
                    bf:97:23:45:a1:13:fe:6e:91:b9:83:ba:60:52:df:0e:
                    96:9d:bb:fb:e3:1b:21:58:99:75:3c:85:7b:bd:70:a3:
                    02:b2:fe:79:94:0a:dc:45:2b:88:bf:93:73:7b:00:a5:
                    4a:38:3c:16:d9:56:2f:f6:99:4e:8b:c2:a2:bd:56:3e:
                    51:bb:f0:42:92:a2:31:54:8b:b1:e5:45:2f:a0:d7:a2:
                    c5:11:de:28:3e:0d:61:41:94:22:a4:8c:bf:43:e8:38:
                    96:56:b9:c6:78:b3:ec:20:ba:73:f9:13:f8:9b:ed:de:
                    91:89:a5:9b:f8:d8:c4:2c:e9:7f:d7:72:5e:5a:32:9a:
                    0d:de:53:7a:6a:e7:7a:60:7c:fa:9e:1a:8a:e9:56:74:
                    fb:01:c6:de:ce:8a:b4:2d:5d:d2:2a:c8:87:38:70:90:
                    79:e1:e0:c7:f8:34:50:a2:ba:15:bf:82:06:b5:55:d2:
                    3c:49:5a:32:bf:3b:34:4d:ea:a8:98:0f:d7:38:94:7f:
                    ba:14:f7:b1:a8:f3:25:6d:39:89:d0:f5:a7:7c:cd:50:
                    fa:0d:25:77:38:37:55:72:c1:20:3a:91:c7:b5:da:3b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        79:9c:47:57:34:aa:20:e9:ca:77:f0:7c:d0:aa:4e:69:
        25:b3:41:f0:0e:14:7c:5d:29:19:35:b0:88:74:fe:7b:
        6d:f9:ff:c8:7d:a9:51:74:28:af:05:59:03:d0:77:e8:
        d8:86:99:28:de:d8:de:d2:c2:83:2b:c1:9c:2c:a4:4c:
        ef:64:9e:62:cf:ca:6d:b3:d3:33:a3:52:32:5a:1f:14:
        46:39:bf:2b:b3:dc:6c:0e:37:89:6a:71:bf:1a:ff:8a:
        ba:c5:dd:4d:ad:65:87:2b:8f:83:b3:0a:8e:2b:9f:35:
        69:7c:b0:9d:cd:9e:28:4f:e1:98:8d:e2:48:4f:5d:31:
        aa:06:75:59:3e:b5:f4:36:ed:5d:61:bb:59:51:e9:77:
        70:f7:7d:cf:7e:b7:a5:25:51:74:a6:59:e3:84:49:f9:
        f5:48:2e:32:cc:9b:c1:de:fd:f7:ad:1a:73:65:bb:02:
        68:0a:3a:06:87:3d:0f:d9:f6:92:c9:49:b0:2e:8c:27:
        70:17:0d:33:db:19:9c:75:75:9a:84:05:f0:ee:35:45:
        32:f9:fc:02:a2:09:89:13:a9:24:e6:ee:25:71:c7:22:
        69:2c:6f:24:05:e3:18:1f:cd:c2:c9:fd:74:b7:2c:2d:
        36:bb:f4:bf:94:35:15:cd:0f:d7:79:a7:a9:59:be:cc
    Fingerprint (SHA-256):
        F4:8A:01:90:B0:AE:DE:A6:9A:99:9E:FF:F6:2F:8A:69:8F:C0:BA:CB:87:BE:D7:F4:4C:7C:3B:EE:62:1D:53:2E
    Fingerprint (SHA1):
        AD:40:CA:DE:22:46:9E:8C:72:F9:CB:F0:A2:3E:3E:13:57:97:DA:55

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3831: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185165 (0x1ef2230d)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 18:58:53 2017
            Not After : Thu May 19 18:58:53 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:6e:7e:7d:a3:0d:30:b1:0f:98:dc:1c:6c:c8:e8:ad:
                    3a:f1:8f:ef:e4:7d:63:ba:7a:56:c7:9a:9d:9a:92:3f:
                    ea:6f:68:83:8e:f6:5d:39:6e:7c:d1:d7:d2:98:2a:b1:
                    fe:5d:de:16:bf:f7:8a:5b:52:87:14:86:59:65:bd:4e:
                    24:20:cf:7f:37:fd:85:2d:73:91:7b:76:c0:1e:8a:b3:
                    52:53:15:53:ef:2a:ca:35:53:5f:5e:0e:b5:02:f3:3c:
                    83:a1:b9:a5:62:56:e2:53:36:0f:9b:75:e5:52:05:9e:
                    bf:fb:7f:58:7d:7a:03:f2:0f:aa:41:d3:02:aa:61:3a:
                    94:82:be:08:d9:c4:57:91:7b:eb:4a:3f:c5:97:6c:fa:
                    08:29:f5:b5:c4:7b:24:7f:6b:b2:55:58:5f:84:0f:f5:
                    da:1e:fe:4e:5a:c0:0d:d8:15:12:fd:3c:ec:5c:76:18:
                    5f:37:6b:d0:42:24:3e:f3:8b:a5:a1:28:a8:cb:af:8b:
                    e1:dd:cd:5d:d5:22:06:85:d2:e5:c0:da:51:0c:67:57:
                    70:8c:ca:f1:94:c0:49:60:65:bd:56:1b:ba:d8:58:ef:
                    30:62:87:21:af:86:b7:6c:f2:8f:4c:0d:ad:e8:28:30:
                    de:63:52:5b:4f:46:da:66:4b:c1:c7:07:bb:03:7c:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        92:a2:dd:77:8f:28:a8:b0:d4:1f:43:b8:40:78:3b:0c:
        ca:4a:2b:3e:4a:ad:fb:c7:17:b5:f6:50:3b:84:96:8f:
        90:ee:5a:15:9a:02:f2:da:2c:1a:98:f8:2f:bc:db:e9:
        d5:9a:6b:fd:f7:5b:a3:88:6d:3d:54:5b:21:10:2c:02:
        51:00:ef:cb:87:44:de:7d:e9:ec:4b:c4:3f:22:30:1b:
        96:07:51:bb:09:91:3f:80:fc:d5:d0:ae:d5:81:01:49:
        a7:66:08:c1:d3:cd:1b:1e:71:17:8c:26:ec:fb:0c:ab:
        87:50:9c:11:bb:64:3a:81:1a:a4:56:12:10:0b:a3:3c:
        e6:4f:62:01:a8:fb:30:13:e7:b9:d6:bf:05:78:df:6b:
        9d:ab:c2:97:8c:1a:40:d3:26:0f:25:fe:4d:2f:40:02:
        ef:6b:e6:b3:9b:0d:33:bb:71:3a:1e:61:fa:72:d1:6e:
        94:f6:28:76:11:17:97:32:f1:16:6b:90:b3:09:4d:13:
        09:c1:17:4e:c5:05:de:5d:a4:39:58:54:83:1f:48:69:
        dc:54:6a:f6:9f:21:da:27:c1:17:b6:22:1c:b1:85:e5:
        2f:55:2b:36:7d:4b:3d:d3:1e:a5:08:08:32:15:b1:30:
        40:ee:02:27:4f:e2:30:24:ee:60:36:b4:de:fb:4e:b1
    Fingerprint (SHA-256):
        62:EB:E5:D0:3D:59:69:FD:93:95:C0:4E:52:F1:90:76:BB:C4:21:A4:04:EA:40:8B:1A:31:CB:F3:69:00:D5:8D
    Fingerprint (SHA1):
        B6:FA:66:B7:8F:B1:34:CF:D3:C8:80:E2:58:56:E6:F4:7B:82:4A:C7

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3832: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185165 (0x1ef2230d)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 18:58:53 2017
            Not After : Thu May 19 18:58:53 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:6e:7e:7d:a3:0d:30:b1:0f:98:dc:1c:6c:c8:e8:ad:
                    3a:f1:8f:ef:e4:7d:63:ba:7a:56:c7:9a:9d:9a:92:3f:
                    ea:6f:68:83:8e:f6:5d:39:6e:7c:d1:d7:d2:98:2a:b1:
                    fe:5d:de:16:bf:f7:8a:5b:52:87:14:86:59:65:bd:4e:
                    24:20:cf:7f:37:fd:85:2d:73:91:7b:76:c0:1e:8a:b3:
                    52:53:15:53:ef:2a:ca:35:53:5f:5e:0e:b5:02:f3:3c:
                    83:a1:b9:a5:62:56:e2:53:36:0f:9b:75:e5:52:05:9e:
                    bf:fb:7f:58:7d:7a:03:f2:0f:aa:41:d3:02:aa:61:3a:
                    94:82:be:08:d9:c4:57:91:7b:eb:4a:3f:c5:97:6c:fa:
                    08:29:f5:b5:c4:7b:24:7f:6b:b2:55:58:5f:84:0f:f5:
                    da:1e:fe:4e:5a:c0:0d:d8:15:12:fd:3c:ec:5c:76:18:
                    5f:37:6b:d0:42:24:3e:f3:8b:a5:a1:28:a8:cb:af:8b:
                    e1:dd:cd:5d:d5:22:06:85:d2:e5:c0:da:51:0c:67:57:
                    70:8c:ca:f1:94:c0:49:60:65:bd:56:1b:ba:d8:58:ef:
                    30:62:87:21:af:86:b7:6c:f2:8f:4c:0d:ad:e8:28:30:
                    de:63:52:5b:4f:46:da:66:4b:c1:c7:07:bb:03:7c:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        92:a2:dd:77:8f:28:a8:b0:d4:1f:43:b8:40:78:3b:0c:
        ca:4a:2b:3e:4a:ad:fb:c7:17:b5:f6:50:3b:84:96:8f:
        90:ee:5a:15:9a:02:f2:da:2c:1a:98:f8:2f:bc:db:e9:
        d5:9a:6b:fd:f7:5b:a3:88:6d:3d:54:5b:21:10:2c:02:
        51:00:ef:cb:87:44:de:7d:e9:ec:4b:c4:3f:22:30:1b:
        96:07:51:bb:09:91:3f:80:fc:d5:d0:ae:d5:81:01:49:
        a7:66:08:c1:d3:cd:1b:1e:71:17:8c:26:ec:fb:0c:ab:
        87:50:9c:11:bb:64:3a:81:1a:a4:56:12:10:0b:a3:3c:
        e6:4f:62:01:a8:fb:30:13:e7:b9:d6:bf:05:78:df:6b:
        9d:ab:c2:97:8c:1a:40:d3:26:0f:25:fe:4d:2f:40:02:
        ef:6b:e6:b3:9b:0d:33:bb:71:3a:1e:61:fa:72:d1:6e:
        94:f6:28:76:11:17:97:32:f1:16:6b:90:b3:09:4d:13:
        09:c1:17:4e:c5:05:de:5d:a4:39:58:54:83:1f:48:69:
        dc:54:6a:f6:9f:21:da:27:c1:17:b6:22:1c:b1:85:e5:
        2f:55:2b:36:7d:4b:3d:d3:1e:a5:08:08:32:15:b1:30:
        40:ee:02:27:4f:e2:30:24:ee:60:36:b4:de:fb:4e:b1
    Fingerprint (SHA-256):
        62:EB:E5:D0:3D:59:69:FD:93:95:C0:4E:52:F1:90:76:BB:C4:21:A4:04:EA:40:8B:1A:31:CB:F3:69:00:D5:8D
    Fingerprint (SHA1):
        B6:FA:66:B7:8F:B1:34:CF:D3:C8:80:E2:58:56:E6:F4:7B:82:4A:C7

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3833: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #3834: AnyPolicy: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185168 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3835: AnyPolicy: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #3836: AnyPolicy: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3837: AnyPolicy: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3838: AnyPolicy: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 519185169   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3839: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3840: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3841: AnyPolicy: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3842: AnyPolicy: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 519185170   --extCP --extIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
0
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3843: AnyPolicy: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3844: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #3845: AnyPolicy: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3846: AnyPolicy: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 519185171   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3847: AnyPolicy: Creating certficate CA3CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA3CA1.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3848: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #3849: AnyPolicy: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o User1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3850: AnyPolicy: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 519185172   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3851: AnyPolicy: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3852: AnyPolicy: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #3853: AnyPolicy: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o User2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3854: AnyPolicy: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 519185173   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3855: AnyPolicy: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3856: AnyPolicy: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB User3DB
certutil -N -d User3DB -f User3DB/dbpasswd
chains.sh: #3857: AnyPolicy: Creating DB User3DB  - PASSED
chains.sh: Creating EE certifiate request User3Req.der
certutil -s "CN=User3 EE, O=User3, C=US"  -R  -d User3DB -f User3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o User3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3858: AnyPolicy: Creating EE certifiate request User3Req.der  - PASSED
chains.sh: Creating certficate User3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 519185174   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3859: AnyPolicy: Creating certficate User3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate User3CA3.der to User3DB database
certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3860: AnyPolicy: Importing certificate User3CA3.der to User3DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3861: AnyPolicy: Creating DB AllDB  - PASSED
chains.sh: Importing certificate RootCA.der to AllDB database
certutil -A -n RootCA  -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der
chains.sh: #3862: AnyPolicy: Importing certificate RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der
chains.sh: #3863: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3864: AnyPolicy: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA1.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der
chains.sh: #3865: AnyPolicy: Importing certificate CA3CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185168 (0x1ef22310)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 18:59:26 2017
            Not After : Thu May 19 18:59:26 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bf:f1:9d:a8:83:f6:ef:d4:a1:98:ff:7c:29:bf:51:0b:
                    94:11:b9:75:1e:04:90:2e:b9:20:b0:c9:5d:23:82:97:
                    96:62:07:32:82:fe:f6:ae:18:91:ed:ba:96:c4:cd:63:
                    cb:93:88:79:c9:78:78:9f:58:73:8a:bb:a0:d2:6c:49:
                    47:e5:92:4f:bd:2d:e7:f9:fc:7f:32:a2:6c:79:5a:a8:
                    e6:10:5a:35:6b:9c:6b:14:8b:de:82:72:9f:72:ef:a6:
                    77:a0:15:70:5b:f2:91:d9:61:12:2c:80:1a:9e:9d:2f:
                    4c:f7:6b:c7:77:d4:b2:f8:12:fd:60:14:df:cb:ee:83:
                    8a:38:32:02:23:90:a4:6c:11:12:7f:07:76:3d:9f:75:
                    ad:f8:d6:2f:f1:89:51:7d:b5:07:9a:03:8c:00:93:13:
                    dc:90:ec:72:7a:a1:12:7a:82:6b:8f:c1:ec:3c:7b:85:
                    da:8c:8b:77:a9:c6:c3:d1:fb:bb:fe:59:22:92:23:c8:
                    2d:44:3d:2d:9e:56:22:c1:99:72:2f:34:1e:f5:52:5f:
                    8a:24:f8:f7:61:5d:ae:f2:24:bc:1f:41:c9:f5:36:05:
                    b9:55:cb:c7:0d:6c:12:b0:26:5e:58:2d:50:b5:24:e0:
                    0b:a9:65:e9:24:07:7c:9a:f2:4d:a0:1e:1a:51:ae:17
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        10:05:5a:04:21:db:80:de:82:1a:17:84:bf:e9:49:7e:
        eb:e4:16:2b:b1:3c:0f:c7:61:eb:6b:bb:22:57:2c:37:
        ff:1e:0d:65:4c:90:51:45:be:ec:82:84:81:ee:b8:65:
        cb:18:f6:e1:09:5b:f6:b2:90:44:c8:9c:ec:03:fe:e3:
        f2:d8:19:c1:f8:42:27:a7:16:94:1e:83:f9:dd:e8:94:
        2b:86:96:a2:2c:96:ad:b0:e0:76:6f:bf:fb:6f:94:d5:
        04:70:d0:1f:f8:0d:72:cd:9c:71:df:4d:8a:71:a5:8f:
        05:33:e4:0b:a8:2e:79:5f:96:61:18:ee:2c:b2:c6:80:
        45:54:60:b7:94:92:61:3f:40:7f:7b:8c:5a:79:87:f7:
        ae:dc:bd:2b:29:c1:ce:07:18:02:b6:ed:9d:99:8a:63:
        70:b9:fb:de:82:a8:13:d8:90:1a:7c:67:03:dd:fe:78:
        66:5d:75:de:e1:4d:0c:ed:8a:f9:ed:14:6f:c6:a3:68:
        f9:6f:d6:27:e9:92:b1:17:03:7e:43:c2:57:18:b4:0b:
        66:8a:c2:3d:da:c0:d5:0c:32:e9:6e:aa:4d:95:0b:d6:
        97:c5:ad:24:8e:ab:03:09:7e:c3:0a:8f:a9:03:24:de:
        11:87:bc:5c:19:3e:91:e4:3e:ae:ca:7b:a8:72:cc:8e
    Fingerprint (SHA-256):
        6F:C6:E2:D7:B8:55:7F:95:8E:FC:13:7C:95:49:BD:B7:0D:E7:C0:4D:80:A2:BA:1D:C0:1E:50:19:C3:22:78:3F
    Fingerprint (SHA1):
        EF:68:EF:71:01:B2:07:30:E2:96:B9:07:48:47:19:C2:4B:A3:BD:06

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3866: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3867: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3868: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3869: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.1.0  User3CA3.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185168 (0x1ef22310)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 18:59:26 2017
            Not After : Thu May 19 18:59:26 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bf:f1:9d:a8:83:f6:ef:d4:a1:98:ff:7c:29:bf:51:0b:
                    94:11:b9:75:1e:04:90:2e:b9:20:b0:c9:5d:23:82:97:
                    96:62:07:32:82:fe:f6:ae:18:91:ed:ba:96:c4:cd:63:
                    cb:93:88:79:c9:78:78:9f:58:73:8a:bb:a0:d2:6c:49:
                    47:e5:92:4f:bd:2d:e7:f9:fc:7f:32:a2:6c:79:5a:a8:
                    e6:10:5a:35:6b:9c:6b:14:8b:de:82:72:9f:72:ef:a6:
                    77:a0:15:70:5b:f2:91:d9:61:12:2c:80:1a:9e:9d:2f:
                    4c:f7:6b:c7:77:d4:b2:f8:12:fd:60:14:df:cb:ee:83:
                    8a:38:32:02:23:90:a4:6c:11:12:7f:07:76:3d:9f:75:
                    ad:f8:d6:2f:f1:89:51:7d:b5:07:9a:03:8c:00:93:13:
                    dc:90:ec:72:7a:a1:12:7a:82:6b:8f:c1:ec:3c:7b:85:
                    da:8c:8b:77:a9:c6:c3:d1:fb:bb:fe:59:22:92:23:c8:
                    2d:44:3d:2d:9e:56:22:c1:99:72:2f:34:1e:f5:52:5f:
                    8a:24:f8:f7:61:5d:ae:f2:24:bc:1f:41:c9:f5:36:05:
                    b9:55:cb:c7:0d:6c:12:b0:26:5e:58:2d:50:b5:24:e0:
                    0b:a9:65:e9:24:07:7c:9a:f2:4d:a0:1e:1a:51:ae:17
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        10:05:5a:04:21:db:80:de:82:1a:17:84:bf:e9:49:7e:
        eb:e4:16:2b:b1:3c:0f:c7:61:eb:6b:bb:22:57:2c:37:
        ff:1e:0d:65:4c:90:51:45:be:ec:82:84:81:ee:b8:65:
        cb:18:f6:e1:09:5b:f6:b2:90:44:c8:9c:ec:03:fe:e3:
        f2:d8:19:c1:f8:42:27:a7:16:94:1e:83:f9:dd:e8:94:
        2b:86:96:a2:2c:96:ad:b0:e0:76:6f:bf:fb:6f:94:d5:
        04:70:d0:1f:f8:0d:72:cd:9c:71:df:4d:8a:71:a5:8f:
        05:33:e4:0b:a8:2e:79:5f:96:61:18:ee:2c:b2:c6:80:
        45:54:60:b7:94:92:61:3f:40:7f:7b:8c:5a:79:87:f7:
        ae:dc:bd:2b:29:c1:ce:07:18:02:b6:ed:9d:99:8a:63:
        70:b9:fb:de:82:a8:13:d8:90:1a:7c:67:03:dd:fe:78:
        66:5d:75:de:e1:4d:0c:ed:8a:f9:ed:14:6f:c6:a3:68:
        f9:6f:d6:27:e9:92:b1:17:03:7e:43:c2:57:18:b4:0b:
        66:8a:c2:3d:da:c0:d5:0c:32:e9:6e:aa:4d:95:0b:d6:
        97:c5:ad:24:8e:ab:03:09:7e:c3:0a:8f:a9:03:24:de:
        11:87:bc:5c:19:3e:91:e4:3e:ae:ca:7b:a8:72:cc:8e
    Fingerprint (SHA-256):
        6F:C6:E2:D7:B8:55:7F:95:8E:FC:13:7C:95:49:BD:B7:0D:E7:C0:4D:80:A2:BA:1D:C0:1E:50:19:C3:22:78:3F
    Fingerprint (SHA1):
        EF:68:EF:71:01:B2:07:30:E2:96:B9:07:48:47:19:C2:4B:A3:BD:06

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User3 EE,O=User3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3870: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.2.0  User3CA3.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3871: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #3872: AnyPolicyWithLevel: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185175 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #3873: AnyPolicyWithLevel: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #3874: AnyPolicyWithLevel: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3875: AnyPolicyWithLevel: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3876: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 519185176   --extCP --extIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3877: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3878: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA12DB
certutil -N -d CA12DB -f CA12DB/dbpasswd
chains.sh: #3879: AnyPolicyWithLevel: Creating DB CA12DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA12Req.der
certutil -s "CN=CA12 Intermediate, O=CA12, C=US"  -R -2 -d CA12DB -f CA12DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA12Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3880: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der  - PASSED
chains.sh: Creating certficate CA12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 519185177   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3881: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA12CA1.der to CA12DB database
certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3882: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database  - PASSED
chains.sh: Creating DB CA13DB
certutil -N -d CA13DB -f CA13DB/dbpasswd
chains.sh: #3883: AnyPolicyWithLevel: Creating DB CA13DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA13Req.der
certutil -s "CN=CA13 Intermediate, O=CA13, C=US"  -R -2 -d CA13DB -f CA13DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA13Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3884: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der  - PASSED
chains.sh: Creating certficate CA13CA12.der signed by CA12
certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 519185178   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3885: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12  - PASSED
chains.sh: Importing certificate CA13CA12.der to CA13DB database
certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3886: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3887: AnyPolicyWithLevel: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3888: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA13.der signed by CA13
certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 519185179   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3889: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13  - PASSED
chains.sh: Importing certificate EE1CA13.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3890: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database  - PASSED
chains.sh: Creating DB CA22DB
certutil -N -d CA22DB -f CA22DB/dbpasswd
chains.sh: #3891: AnyPolicyWithLevel: Creating DB CA22DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA22Req.der
certutil -s "CN=CA22 Intermediate, O=CA22, C=US"  -R -2 -d CA22DB -f CA22DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA22Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3892: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der  - PASSED
chains.sh: Creating certficate CA22CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 519185180   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3893: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA22CA1.der to CA22DB database
certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3894: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database  - PASSED
chains.sh: Creating DB CA23DB
certutil -N -d CA23DB -f CA23DB/dbpasswd
chains.sh: #3895: AnyPolicyWithLevel: Creating DB CA23DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA23Req.der
certutil -s "CN=CA23 Intermediate, O=CA23, C=US"  -R -2 -d CA23DB -f CA23DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA23Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3896: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der  - PASSED
chains.sh: Creating certficate CA23CA22.der signed by CA22
certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 519185181   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3897: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22  - PASSED
chains.sh: Importing certificate CA23CA22.der to CA23DB database
certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3898: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3899: AnyPolicyWithLevel: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3900: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA23.der signed by CA23
certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 519185182   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3901: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23  - PASSED
chains.sh: Importing certificate EE2CA23.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3902: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database  - PASSED
chains.sh: Creating DB CA32DB
certutil -N -d CA32DB -f CA32DB/dbpasswd
chains.sh: #3903: AnyPolicyWithLevel: Creating DB CA32DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA32Req.der
certutil -s "CN=CA32 Intermediate, O=CA32, C=US"  -R -2 -d CA32DB -f CA32DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA32Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3904: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der  - PASSED
chains.sh: Creating certficate CA32CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 519185183   --extCP --extIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3905: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA32CA1.der to CA32DB database
certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3906: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database  - PASSED
chains.sh: Creating DB CA33DB
certutil -N -d CA33DB -f CA33DB/dbpasswd
chains.sh: #3907: AnyPolicyWithLevel: Creating DB CA33DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA33Req.der
certutil -s "CN=CA33 Intermediate, O=CA33, C=US"  -R -2 -d CA33DB -f CA33DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA33Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3908: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der  - PASSED
chains.sh: Creating certficate CA33CA32.der signed by CA32
certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 519185184   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3909: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32  - PASSED
chains.sh: Importing certificate CA33CA32.der to CA33DB database
certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3910: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #3911: AnyPolicyWithLevel: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US"  -R  -d EE3DB -f EE3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3912: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA33.der signed by CA33
certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 519185185   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3913: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33  - PASSED
chains.sh: Importing certificate EE3CA33.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3914: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database  - PASSED
chains.sh: Creating DB CA42DB
certutil -N -d CA42DB -f CA42DB/dbpasswd
chains.sh: #3915: AnyPolicyWithLevel: Creating DB CA42DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA42Req.der
certutil -s "CN=CA42 Intermediate, O=CA42, C=US"  -R -2 -d CA42DB -f CA42DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA42Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3916: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der  - PASSED
chains.sh: Creating certficate CA42CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 519185186   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3917: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA42CA1.der to CA42DB database
certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3918: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database  - PASSED
chains.sh: Creating DB CA43DB
certutil -N -d CA43DB -f CA43DB/dbpasswd
chains.sh: #3919: AnyPolicyWithLevel: Creating DB CA43DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA43Req.der
certutil -s "CN=CA43 Intermediate, O=CA43, C=US"  -R -2 -d CA43DB -f CA43DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA43Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3920: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der  - PASSED
chains.sh: Creating certficate CA43CA42.der signed by CA42
certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 519185187   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3921: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42  - PASSED
chains.sh: Importing certificate CA43CA42.der to CA43DB database
certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3922: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #3923: AnyPolicyWithLevel: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US"  -R  -d EE4DB -f EE4DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE4Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3924: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA43.der signed by CA43
certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 519185188   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3925: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43  - PASSED
chains.sh: Importing certificate EE4CA43.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3926: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database  - PASSED
chains.sh: Creating DB CA52DB
certutil -N -d CA52DB -f CA52DB/dbpasswd
chains.sh: #3927: AnyPolicyWithLevel: Creating DB CA52DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA52Req.der
certutil -s "CN=CA52 Intermediate, O=CA52, C=US"  -R -2 -d CA52DB -f CA52DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA52Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3928: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der  - PASSED
chains.sh: Creating certficate CA52CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 519185189   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3929: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA52CA1.der to CA52DB database
certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3930: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database  - PASSED
chains.sh: Creating DB CA53DB
certutil -N -d CA53DB -f CA53DB/dbpasswd
chains.sh: #3931: AnyPolicyWithLevel: Creating DB CA53DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA53Req.der
certutil -s "CN=CA53 Intermediate, O=CA53, C=US"  -R -2 -d CA53DB -f CA53DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA53Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3932: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der  - PASSED
chains.sh: Creating certficate CA53CA52.der signed by CA52
certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 519185190   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3933: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52  - PASSED
chains.sh: Importing certificate CA53CA52.der to CA53DB database
certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3934: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database  - PASSED
chains.sh: Creating DB EE5DB
certutil -N -d EE5DB -f EE5DB/dbpasswd
chains.sh: #3935: AnyPolicyWithLevel: Creating DB EE5DB  - PASSED
chains.sh: Creating EE certifiate request EE5Req.der
certutil -s "CN=EE5 EE, O=EE5, C=US"  -R  -d EE5DB -f EE5DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE5Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3936: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der  - PASSED
chains.sh: Creating certficate EE5CA53.der signed by CA53
certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 519185191   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3937: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53  - PASSED
chains.sh: Importing certificate EE5CA53.der to EE5DB database
certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3938: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database  - PASSED
chains.sh: Creating DB CA61DB
certutil -N -d CA61DB -f CA61DB/dbpasswd
chains.sh: #3939: AnyPolicyWithLevel: Creating DB CA61DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA61Req.der
certutil -s "CN=CA61 Intermediate, O=CA61, C=US"  -R -2 -d CA61DB -f CA61DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA61Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3940: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der  - PASSED
chains.sh: Creating certficate CA61RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 519185192   --extCP --extIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n
5
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3941: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA61RootCA.der to CA61DB database
certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3942: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database  - PASSED
chains.sh: Creating DB CA62DB
certutil -N -d CA62DB -f CA62DB/dbpasswd
chains.sh: #3943: AnyPolicyWithLevel: Creating DB CA62DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA62Req.der
certutil -s "CN=CA62 Intermediate, O=CA62, C=US"  -R -2 -d CA62DB -f CA62DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA62Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3944: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der  - PASSED
chains.sh: Creating certficate CA62CA61.der signed by CA61
certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 519185193   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3945: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61  - PASSED
chains.sh: Importing certificate CA62CA61.der to CA62DB database
certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3946: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database  - PASSED
chains.sh: Creating DB EE62DB
certutil -N -d EE62DB -f EE62DB/dbpasswd
chains.sh: #3947: AnyPolicyWithLevel: Creating DB EE62DB  - PASSED
chains.sh: Creating EE certifiate request EE62Req.der
certutil -s "CN=EE62 EE, O=EE62, C=US"  -R  -d EE62DB -f EE62DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE62Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3948: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der  - PASSED
chains.sh: Creating certficate EE62CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 519185194   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3949: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate EE62CA62.der to EE62DB database
certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3950: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database  - PASSED
chains.sh: Creating DB CA63DB
certutil -N -d CA63DB -f CA63DB/dbpasswd
chains.sh: #3951: AnyPolicyWithLevel: Creating DB CA63DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA63Req.der
certutil -s "CN=CA63 Intermediate, O=CA63, C=US"  -R -2 -d CA63DB -f CA63DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA63Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3952: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der  - PASSED
chains.sh: Creating certficate CA63CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 519185195   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3953: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate CA63CA62.der to CA63DB database
certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3954: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database  - PASSED
chains.sh: Creating DB EE63DB
certutil -N -d EE63DB -f EE63DB/dbpasswd
chains.sh: #3955: AnyPolicyWithLevel: Creating DB EE63DB  - PASSED
chains.sh: Creating EE certifiate request EE63Req.der
certutil -s "CN=EE63 EE, O=EE63, C=US"  -R  -d EE63DB -f EE63DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE63Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3956: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der  - PASSED
chains.sh: Creating certficate EE63CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 519185196   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3957: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate EE63CA63.der to EE63DB database
certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3958: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database  - PASSED
chains.sh: Creating DB CA64DB
certutil -N -d CA64DB -f CA64DB/dbpasswd
chains.sh: #3959: AnyPolicyWithLevel: Creating DB CA64DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA64Req.der
certutil -s "CN=CA64 Intermediate, O=CA64, C=US"  -R -2 -d CA64DB -f CA64DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA64Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3960: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der  - PASSED
chains.sh: Creating certficate CA64CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 519185197   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3961: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate CA64CA63.der to CA64DB database
certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3962: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database  - PASSED
chains.sh: Creating DB EE64DB
certutil -N -d EE64DB -f EE64DB/dbpasswd
chains.sh: #3963: AnyPolicyWithLevel: Creating DB EE64DB  - PASSED
chains.sh: Creating EE certifiate request EE64Req.der
certutil -s "CN=EE64 EE, O=EE64, C=US"  -R  -d EE64DB -f EE64DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE64Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3964: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der  - PASSED
chains.sh: Creating certficate EE64CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 519185198   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3965: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate EE64CA64.der to EE64DB database
certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3966: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database  - PASSED
chains.sh: Creating DB CA65DB
certutil -N -d CA65DB -f CA65DB/dbpasswd
chains.sh: #3967: AnyPolicyWithLevel: Creating DB CA65DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA65Req.der
certutil -s "CN=CA65 Intermediate, O=CA65, C=US"  -R -2 -d CA65DB -f CA65DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA65Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3968: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der  - PASSED
chains.sh: Creating certficate CA65CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 519185199   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3969: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate CA65CA64.der to CA65DB database
certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3970: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database  - PASSED
chains.sh: Creating DB EE65DB
certutil -N -d EE65DB -f EE65DB/dbpasswd
chains.sh: #3971: AnyPolicyWithLevel: Creating DB EE65DB  - PASSED
chains.sh: Creating EE certifiate request EE65Req.der
certutil -s "CN=EE65 EE, O=EE65, C=US"  -R  -d EE65DB -f EE65DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE65Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3972: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der  - PASSED
chains.sh: Creating certficate EE65CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 519185200   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3973: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate EE65CA65.der to EE65DB database
certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3974: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database  - PASSED
chains.sh: Creating DB CA66DB
certutil -N -d CA66DB -f CA66DB/dbpasswd
chains.sh: #3975: AnyPolicyWithLevel: Creating DB CA66DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA66Req.der
certutil -s "CN=CA66 Intermediate, O=CA66, C=US"  -R -2 -d CA66DB -f CA66DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA66Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3976: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der  - PASSED
chains.sh: Creating certficate CA66CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 519185201   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3977: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate CA66CA65.der to CA66DB database
certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3978: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database  - PASSED
chains.sh: Creating DB EE66DB
certutil -N -d EE66DB -f EE66DB/dbpasswd
chains.sh: #3979: AnyPolicyWithLevel: Creating DB EE66DB  - PASSED
chains.sh: Creating EE certifiate request EE66Req.der
certutil -s "CN=EE66 EE, O=EE66, C=US"  -R  -d EE66DB -f EE66DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE66Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3980: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der  - PASSED
chains.sh: Creating certficate EE66CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 519185202   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3981: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate EE66CA66.der to EE66DB database
certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3982: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database  - PASSED
chains.sh: Creating DB CA67DB
certutil -N -d CA67DB -f CA67DB/dbpasswd
chains.sh: #3983: AnyPolicyWithLevel: Creating DB CA67DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA67Req.der
certutil -s "CN=CA67 Intermediate, O=CA67, C=US"  -R -2 -d CA67DB -f CA67DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA67Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3984: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der  - PASSED
chains.sh: Creating certficate CA67CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 519185203   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3985: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate CA67CA66.der to CA67DB database
certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3986: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database  - PASSED
chains.sh: Creating DB EE67DB
certutil -N -d EE67DB -f EE67DB/dbpasswd
chains.sh: #3987: AnyPolicyWithLevel: Creating DB EE67DB  - PASSED
chains.sh: Creating EE certifiate request EE67Req.der
certutil -s "CN=EE67 EE, O=EE67, C=US"  -R  -d EE67DB -f EE67DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE67Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3988: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der  - PASSED
chains.sh: Creating certficate EE67CA67.der signed by CA67
certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 519185204   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3989: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67  - PASSED
chains.sh: Importing certificate EE67CA67.der to EE67DB database
certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #3990: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3991: AnyPolicyWithLevel: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185175 (0x1ef22317)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:00:48 2017
            Not After : Thu May 19 19:00:48 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:3a:ed:8c:2c:42:16:03:bd:d7:d1:6b:9f:20:b6:92:
                    32:85:61:3b:df:76:84:9a:ad:a1:a4:c8:a4:d6:9c:e9:
                    77:c4:91:32:cf:a2:5a:5c:3d:21:02:e2:48:49:0e:5e:
                    75:a4:7d:56:97:15:aa:9f:c6:26:b4:61:d1:be:57:f8:
                    a0:ab:f9:44:5d:55:7b:a5:73:e7:d3:7e:8d:a5:c5:ee:
                    35:8e:4e:3f:ed:af:8c:e3:2d:03:99:6f:15:37:8b:e6:
                    d2:59:45:2d:13:4b:e0:92:f1:5d:f0:23:7e:94:29:8f:
                    c2:ea:26:bf:c5:8f:ba:16:54:4e:cf:8d:1f:04:c5:48:
                    ff:3f:e9:b2:d1:a3:8b:54:96:df:77:47:a3:58:4a:0d:
                    33:c8:0c:25:1c:20:22:23:ba:08:86:d6:75:77:8e:25:
                    f4:8c:92:c4:22:14:2f:0c:56:3a:21:d1:77:7f:90:f4:
                    7a:14:24:1d:21:73:f5:e7:4d:c5:c1:e2:8c:f4:11:78:
                    9e:e6:be:e2:56:39:51:31:5f:35:3f:5e:46:62:ba:68:
                    b8:8b:af:57:a2:65:9b:1b:38:27:5d:72:81:ac:88:dc:
                    fd:2a:e3:0a:1a:78:08:9c:66:75:d2:55:58:b0:11:45:
                    d1:f8:8f:4d:39:a1:1f:8d:0a:21:d4:ee:2c:f3:08:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        4e:bf:a3:8b:56:f9:e4:30:ef:8d:06:50:c7:42:92:68:
        68:da:f2:af:2e:9c:be:45:b4:57:ad:d7:e9:b6:c9:07:
        f7:54:77:6b:50:a7:fc:f6:78:d1:ff:6e:9b:10:8d:97:
        c6:da:c7:ff:f7:d9:c3:7e:92:b7:b5:1d:00:ed:44:7d:
        4b:a9:a7:28:89:11:6f:d7:17:bb:e4:d9:76:e7:af:6f:
        34:e2:e8:da:44:e9:39:54:1c:e2:69:1f:2c:38:20:80:
        f7:9f:f7:7f:89:55:cf:45:b6:4d:43:6f:53:34:94:7c:
        73:21:8a:db:70:15:64:76:95:52:f2:f8:08:1b:2b:3a:
        37:b5:e2:3c:f2:cf:95:e9:54:88:e9:71:f6:04:d5:aa:
        0f:fb:b8:29:6c:08:45:c9:19:f5:c2:8a:cc:82:10:ae:
        2f:48:cb:2f:3b:d7:13:e3:58:b6:7a:a5:16:df:3f:cf:
        2d:84:03:3a:48:15:d3:d3:91:63:46:d9:14:4b:87:eb:
        94:5f:3b:58:23:a4:4d:99:af:af:69:18:73:41:bc:6d:
        14:c6:7b:7b:5b:93:84:4a:68:7b:79:14:90:9c:8d:df:
        56:54:ae:b3:17:f8:85:b7:14:71:19:eb:58:26:08:ab:
        69:af:ec:8a:9b:7b:b3:6e:ee:db:73:38:ed:53:cc:bd
    Fingerprint (SHA-256):
        28:EB:D6:F6:1A:C7:B9:32:F7:2A:8F:F2:FE:CC:CB:3F:74:AA:3A:CA:B0:A4:13:47:5C:57:FF:BB:17:1C:E7:59
    Fingerprint (SHA1):
        0A:06:66:ED:28:1C:C2:A4:C9:B3:9A:69:91:09:CF:52:32:B0:B7:A5


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3992: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3993: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185175 (0x1ef22317)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:00:48 2017
            Not After : Thu May 19 19:00:48 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:3a:ed:8c:2c:42:16:03:bd:d7:d1:6b:9f:20:b6:92:
                    32:85:61:3b:df:76:84:9a:ad:a1:a4:c8:a4:d6:9c:e9:
                    77:c4:91:32:cf:a2:5a:5c:3d:21:02:e2:48:49:0e:5e:
                    75:a4:7d:56:97:15:aa:9f:c6:26:b4:61:d1:be:57:f8:
                    a0:ab:f9:44:5d:55:7b:a5:73:e7:d3:7e:8d:a5:c5:ee:
                    35:8e:4e:3f:ed:af:8c:e3:2d:03:99:6f:15:37:8b:e6:
                    d2:59:45:2d:13:4b:e0:92:f1:5d:f0:23:7e:94:29:8f:
                    c2:ea:26:bf:c5:8f:ba:16:54:4e:cf:8d:1f:04:c5:48:
                    ff:3f:e9:b2:d1:a3:8b:54:96:df:77:47:a3:58:4a:0d:
                    33:c8:0c:25:1c:20:22:23:ba:08:86:d6:75:77:8e:25:
                    f4:8c:92:c4:22:14:2f:0c:56:3a:21:d1:77:7f:90:f4:
                    7a:14:24:1d:21:73:f5:e7:4d:c5:c1:e2:8c:f4:11:78:
                    9e:e6:be:e2:56:39:51:31:5f:35:3f:5e:46:62:ba:68:
                    b8:8b:af:57:a2:65:9b:1b:38:27:5d:72:81:ac:88:dc:
                    fd:2a:e3:0a:1a:78:08:9c:66:75:d2:55:58:b0:11:45:
                    d1:f8:8f:4d:39:a1:1f:8d:0a:21:d4:ee:2c:f3:08:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        4e:bf:a3:8b:56:f9:e4:30:ef:8d:06:50:c7:42:92:68:
        68:da:f2:af:2e:9c:be:45:b4:57:ad:d7:e9:b6:c9:07:
        f7:54:77:6b:50:a7:fc:f6:78:d1:ff:6e:9b:10:8d:97:
        c6:da:c7:ff:f7:d9:c3:7e:92:b7:b5:1d:00:ed:44:7d:
        4b:a9:a7:28:89:11:6f:d7:17:bb:e4:d9:76:e7:af:6f:
        34:e2:e8:da:44:e9:39:54:1c:e2:69:1f:2c:38:20:80:
        f7:9f:f7:7f:89:55:cf:45:b6:4d:43:6f:53:34:94:7c:
        73:21:8a:db:70:15:64:76:95:52:f2:f8:08:1b:2b:3a:
        37:b5:e2:3c:f2:cf:95:e9:54:88:e9:71:f6:04:d5:aa:
        0f:fb:b8:29:6c:08:45:c9:19:f5:c2:8a:cc:82:10:ae:
        2f:48:cb:2f:3b:d7:13:e3:58:b6:7a:a5:16:df:3f:cf:
        2d:84:03:3a:48:15:d3:d3:91:63:46:d9:14:4b:87:eb:
        94:5f:3b:58:23:a4:4d:99:af:af:69:18:73:41:bc:6d:
        14:c6:7b:7b:5b:93:84:4a:68:7b:79:14:90:9c:8d:df:
        56:54:ae:b3:17:f8:85:b7:14:71:19:eb:58:26:08:ab:
        69:af:ec:8a:9b:7b:b3:6e:ee:db:73:38:ed:53:cc:bd
    Fingerprint (SHA-256):
        28:EB:D6:F6:1A:C7:B9:32:F7:2A:8F:F2:FE:CC:CB:3F:74:AA:3A:CA:B0:A4:13:47:5C:57:FF:BB:17:1C:E7:59
    Fingerprint (SHA1):
        0A:06:66:ED:28:1C:C2:A4:C9:B3:9A:69:91:09:CF:52:32:B0:B7:A5


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3994: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3995: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3996: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3997: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp       -t RootCA.der
vfychain -d AllDB -pp -vv       EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185175 (0x1ef22317)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:00:48 2017
            Not After : Thu May 19 19:00:48 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:3a:ed:8c:2c:42:16:03:bd:d7:d1:6b:9f:20:b6:92:
                    32:85:61:3b:df:76:84:9a:ad:a1:a4:c8:a4:d6:9c:e9:
                    77:c4:91:32:cf:a2:5a:5c:3d:21:02:e2:48:49:0e:5e:
                    75:a4:7d:56:97:15:aa:9f:c6:26:b4:61:d1:be:57:f8:
                    a0:ab:f9:44:5d:55:7b:a5:73:e7:d3:7e:8d:a5:c5:ee:
                    35:8e:4e:3f:ed:af:8c:e3:2d:03:99:6f:15:37:8b:e6:
                    d2:59:45:2d:13:4b:e0:92:f1:5d:f0:23:7e:94:29:8f:
                    c2:ea:26:bf:c5:8f:ba:16:54:4e:cf:8d:1f:04:c5:48:
                    ff:3f:e9:b2:d1:a3:8b:54:96:df:77:47:a3:58:4a:0d:
                    33:c8:0c:25:1c:20:22:23:ba:08:86:d6:75:77:8e:25:
                    f4:8c:92:c4:22:14:2f:0c:56:3a:21:d1:77:7f:90:f4:
                    7a:14:24:1d:21:73:f5:e7:4d:c5:c1:e2:8c:f4:11:78:
                    9e:e6:be:e2:56:39:51:31:5f:35:3f:5e:46:62:ba:68:
                    b8:8b:af:57:a2:65:9b:1b:38:27:5d:72:81:ac:88:dc:
                    fd:2a:e3:0a:1a:78:08:9c:66:75:d2:55:58:b0:11:45:
                    d1:f8:8f:4d:39:a1:1f:8d:0a:21:d4:ee:2c:f3:08:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        4e:bf:a3:8b:56:f9:e4:30:ef:8d:06:50:c7:42:92:68:
        68:da:f2:af:2e:9c:be:45:b4:57:ad:d7:e9:b6:c9:07:
        f7:54:77:6b:50:a7:fc:f6:78:d1:ff:6e:9b:10:8d:97:
        c6:da:c7:ff:f7:d9:c3:7e:92:b7:b5:1d:00:ed:44:7d:
        4b:a9:a7:28:89:11:6f:d7:17:bb:e4:d9:76:e7:af:6f:
        34:e2:e8:da:44:e9:39:54:1c:e2:69:1f:2c:38:20:80:
        f7:9f:f7:7f:89:55:cf:45:b6:4d:43:6f:53:34:94:7c:
        73:21:8a:db:70:15:64:76:95:52:f2:f8:08:1b:2b:3a:
        37:b5:e2:3c:f2:cf:95:e9:54:88:e9:71:f6:04:d5:aa:
        0f:fb:b8:29:6c:08:45:c9:19:f5:c2:8a:cc:82:10:ae:
        2f:48:cb:2f:3b:d7:13:e3:58:b6:7a:a5:16:df:3f:cf:
        2d:84:03:3a:48:15:d3:d3:91:63:46:d9:14:4b:87:eb:
        94:5f:3b:58:23:a4:4d:99:af:af:69:18:73:41:bc:6d:
        14:c6:7b:7b:5b:93:84:4a:68:7b:79:14:90:9c:8d:df:
        56:54:ae:b3:17:f8:85:b7:14:71:19:eb:58:26:08:ab:
        69:af:ec:8a:9b:7b:b3:6e:ee:db:73:38:ed:53:cc:bd
    Fingerprint (SHA-256):
        28:EB:D6:F6:1A:C7:B9:32:F7:2A:8F:F2:FE:CC:CB:3F:74:AA:3A:CA:B0:A4:13:47:5C:57:FF:BB:17:1C:E7:59
    Fingerprint (SHA1):
        0A:06:66:ED:28:1C:C2:A4:C9:B3:9A:69:91:09:CF:52:32:B0:B7:A5


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US"
Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3998: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp       -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3999: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4000: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4001: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp       -t RootCA.der
vfychain -d AllDB -pp -vv       EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185175 (0x1ef22317)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:00:48 2017
            Not After : Thu May 19 19:00:48 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:3a:ed:8c:2c:42:16:03:bd:d7:d1:6b:9f:20:b6:92:
                    32:85:61:3b:df:76:84:9a:ad:a1:a4:c8:a4:d6:9c:e9:
                    77:c4:91:32:cf:a2:5a:5c:3d:21:02:e2:48:49:0e:5e:
                    75:a4:7d:56:97:15:aa:9f:c6:26:b4:61:d1:be:57:f8:
                    a0:ab:f9:44:5d:55:7b:a5:73:e7:d3:7e:8d:a5:c5:ee:
                    35:8e:4e:3f:ed:af:8c:e3:2d:03:99:6f:15:37:8b:e6:
                    d2:59:45:2d:13:4b:e0:92:f1:5d:f0:23:7e:94:29:8f:
                    c2:ea:26:bf:c5:8f:ba:16:54:4e:cf:8d:1f:04:c5:48:
                    ff:3f:e9:b2:d1:a3:8b:54:96:df:77:47:a3:58:4a:0d:
                    33:c8:0c:25:1c:20:22:23:ba:08:86:d6:75:77:8e:25:
                    f4:8c:92:c4:22:14:2f:0c:56:3a:21:d1:77:7f:90:f4:
                    7a:14:24:1d:21:73:f5:e7:4d:c5:c1:e2:8c:f4:11:78:
                    9e:e6:be:e2:56:39:51:31:5f:35:3f:5e:46:62:ba:68:
                    b8:8b:af:57:a2:65:9b:1b:38:27:5d:72:81:ac:88:dc:
                    fd:2a:e3:0a:1a:78:08:9c:66:75:d2:55:58:b0:11:45:
                    d1:f8:8f:4d:39:a1:1f:8d:0a:21:d4:ee:2c:f3:08:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        4e:bf:a3:8b:56:f9:e4:30:ef:8d:06:50:c7:42:92:68:
        68:da:f2:af:2e:9c:be:45:b4:57:ad:d7:e9:b6:c9:07:
        f7:54:77:6b:50:a7:fc:f6:78:d1:ff:6e:9b:10:8d:97:
        c6:da:c7:ff:f7:d9:c3:7e:92:b7:b5:1d:00:ed:44:7d:
        4b:a9:a7:28:89:11:6f:d7:17:bb:e4:d9:76:e7:af:6f:
        34:e2:e8:da:44:e9:39:54:1c:e2:69:1f:2c:38:20:80:
        f7:9f:f7:7f:89:55:cf:45:b6:4d:43:6f:53:34:94:7c:
        73:21:8a:db:70:15:64:76:95:52:f2:f8:08:1b:2b:3a:
        37:b5:e2:3c:f2:cf:95:e9:54:88:e9:71:f6:04:d5:aa:
        0f:fb:b8:29:6c:08:45:c9:19:f5:c2:8a:cc:82:10:ae:
        2f:48:cb:2f:3b:d7:13:e3:58:b6:7a:a5:16:df:3f:cf:
        2d:84:03:3a:48:15:d3:d3:91:63:46:d9:14:4b:87:eb:
        94:5f:3b:58:23:a4:4d:99:af:af:69:18:73:41:bc:6d:
        14:c6:7b:7b:5b:93:84:4a:68:7b:79:14:90:9c:8d:df:
        56:54:ae:b3:17:f8:85:b7:14:71:19:eb:58:26:08:ab:
        69:af:ec:8a:9b:7b:b3:6e:ee:db:73:38:ed:53:cc:bd
    Fingerprint (SHA-256):
        28:EB:D6:F6:1A:C7:B9:32:F7:2A:8F:F2:FE:CC:CB:3F:74:AA:3A:CA:B0:A4:13:47:5C:57:FF:BB:17:1C:E7:59
    Fingerprint (SHA1):
        0A:06:66:ED:28:1C:C2:A4:C9:B3:9A:69:91:09:CF:52:32:B0:B7:A5


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US"
Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4002: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp       -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185175 (0x1ef22317)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:00:48 2017
            Not After : Thu May 19 19:00:48 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:3a:ed:8c:2c:42:16:03:bd:d7:d1:6b:9f:20:b6:92:
                    32:85:61:3b:df:76:84:9a:ad:a1:a4:c8:a4:d6:9c:e9:
                    77:c4:91:32:cf:a2:5a:5c:3d:21:02:e2:48:49:0e:5e:
                    75:a4:7d:56:97:15:aa:9f:c6:26:b4:61:d1:be:57:f8:
                    a0:ab:f9:44:5d:55:7b:a5:73:e7:d3:7e:8d:a5:c5:ee:
                    35:8e:4e:3f:ed:af:8c:e3:2d:03:99:6f:15:37:8b:e6:
                    d2:59:45:2d:13:4b:e0:92:f1:5d:f0:23:7e:94:29:8f:
                    c2:ea:26:bf:c5:8f:ba:16:54:4e:cf:8d:1f:04:c5:48:
                    ff:3f:e9:b2:d1:a3:8b:54:96:df:77:47:a3:58:4a:0d:
                    33:c8:0c:25:1c:20:22:23:ba:08:86:d6:75:77:8e:25:
                    f4:8c:92:c4:22:14:2f:0c:56:3a:21:d1:77:7f:90:f4:
                    7a:14:24:1d:21:73:f5:e7:4d:c5:c1:e2:8c:f4:11:78:
                    9e:e6:be:e2:56:39:51:31:5f:35:3f:5e:46:62:ba:68:
                    b8:8b:af:57:a2:65:9b:1b:38:27:5d:72:81:ac:88:dc:
                    fd:2a:e3:0a:1a:78:08:9c:66:75:d2:55:58:b0:11:45:
                    d1:f8:8f:4d:39:a1:1f:8d:0a:21:d4:ee:2c:f3:08:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        4e:bf:a3:8b:56:f9:e4:30:ef:8d:06:50:c7:42:92:68:
        68:da:f2:af:2e:9c:be:45:b4:57:ad:d7:e9:b6:c9:07:
        f7:54:77:6b:50:a7:fc:f6:78:d1:ff:6e:9b:10:8d:97:
        c6:da:c7:ff:f7:d9:c3:7e:92:b7:b5:1d:00:ed:44:7d:
        4b:a9:a7:28:89:11:6f:d7:17:bb:e4:d9:76:e7:af:6f:
        34:e2:e8:da:44:e9:39:54:1c:e2:69:1f:2c:38:20:80:
        f7:9f:f7:7f:89:55:cf:45:b6:4d:43:6f:53:34:94:7c:
        73:21:8a:db:70:15:64:76:95:52:f2:f8:08:1b:2b:3a:
        37:b5:e2:3c:f2:cf:95:e9:54:88:e9:71:f6:04:d5:aa:
        0f:fb:b8:29:6c:08:45:c9:19:f5:c2:8a:cc:82:10:ae:
        2f:48:cb:2f:3b:d7:13:e3:58:b6:7a:a5:16:df:3f:cf:
        2d:84:03:3a:48:15:d3:d3:91:63:46:d9:14:4b:87:eb:
        94:5f:3b:58:23:a4:4d:99:af:af:69:18:73:41:bc:6d:
        14:c6:7b:7b:5b:93:84:4a:68:7b:79:14:90:9c:8d:df:
        56:54:ae:b3:17:f8:85:b7:14:71:19:eb:58:26:08:ab:
        69:af:ec:8a:9b:7b:b3:6e:ee:db:73:38:ed:53:cc:bd
    Fingerprint (SHA-256):
        28:EB:D6:F6:1A:C7:B9:32:F7:2A:8F:F2:FE:CC:CB:3F:74:AA:3A:CA:B0:A4:13:47:5C:57:FF:BB:17:1C:E7:59
    Fingerprint (SHA1):
        0A:06:66:ED:28:1C:C2:A4:C9:B3:9A:69:91:09:CF:52:32:B0:B7:A5


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4003: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4004: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185175 (0x1ef22317)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:00:48 2017
            Not After : Thu May 19 19:00:48 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:3a:ed:8c:2c:42:16:03:bd:d7:d1:6b:9f:20:b6:92:
                    32:85:61:3b:df:76:84:9a:ad:a1:a4:c8:a4:d6:9c:e9:
                    77:c4:91:32:cf:a2:5a:5c:3d:21:02:e2:48:49:0e:5e:
                    75:a4:7d:56:97:15:aa:9f:c6:26:b4:61:d1:be:57:f8:
                    a0:ab:f9:44:5d:55:7b:a5:73:e7:d3:7e:8d:a5:c5:ee:
                    35:8e:4e:3f:ed:af:8c:e3:2d:03:99:6f:15:37:8b:e6:
                    d2:59:45:2d:13:4b:e0:92:f1:5d:f0:23:7e:94:29:8f:
                    c2:ea:26:bf:c5:8f:ba:16:54:4e:cf:8d:1f:04:c5:48:
                    ff:3f:e9:b2:d1:a3:8b:54:96:df:77:47:a3:58:4a:0d:
                    33:c8:0c:25:1c:20:22:23:ba:08:86:d6:75:77:8e:25:
                    f4:8c:92:c4:22:14:2f:0c:56:3a:21:d1:77:7f:90:f4:
                    7a:14:24:1d:21:73:f5:e7:4d:c5:c1:e2:8c:f4:11:78:
                    9e:e6:be:e2:56:39:51:31:5f:35:3f:5e:46:62:ba:68:
                    b8:8b:af:57:a2:65:9b:1b:38:27:5d:72:81:ac:88:dc:
                    fd:2a:e3:0a:1a:78:08:9c:66:75:d2:55:58:b0:11:45:
                    d1:f8:8f:4d:39:a1:1f:8d:0a:21:d4:ee:2c:f3:08:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        4e:bf:a3:8b:56:f9:e4:30:ef:8d:06:50:c7:42:92:68:
        68:da:f2:af:2e:9c:be:45:b4:57:ad:d7:e9:b6:c9:07:
        f7:54:77:6b:50:a7:fc:f6:78:d1:ff:6e:9b:10:8d:97:
        c6:da:c7:ff:f7:d9:c3:7e:92:b7:b5:1d:00:ed:44:7d:
        4b:a9:a7:28:89:11:6f:d7:17:bb:e4:d9:76:e7:af:6f:
        34:e2:e8:da:44:e9:39:54:1c:e2:69:1f:2c:38:20:80:
        f7:9f:f7:7f:89:55:cf:45:b6:4d:43:6f:53:34:94:7c:
        73:21:8a:db:70:15:64:76:95:52:f2:f8:08:1b:2b:3a:
        37:b5:e2:3c:f2:cf:95:e9:54:88:e9:71:f6:04:d5:aa:
        0f:fb:b8:29:6c:08:45:c9:19:f5:c2:8a:cc:82:10:ae:
        2f:48:cb:2f:3b:d7:13:e3:58:b6:7a:a5:16:df:3f:cf:
        2d:84:03:3a:48:15:d3:d3:91:63:46:d9:14:4b:87:eb:
        94:5f:3b:58:23:a4:4d:99:af:af:69:18:73:41:bc:6d:
        14:c6:7b:7b:5b:93:84:4a:68:7b:79:14:90:9c:8d:df:
        56:54:ae:b3:17:f8:85:b7:14:71:19:eb:58:26:08:ab:
        69:af:ec:8a:9b:7b:b3:6e:ee:db:73:38:ed:53:cc:bd
    Fingerprint (SHA-256):
        28:EB:D6:F6:1A:C7:B9:32:F7:2A:8F:F2:FE:CC:CB:3F:74:AA:3A:CA:B0:A4:13:47:5C:57:FF:BB:17:1C:E7:59
    Fingerprint (SHA1):
        0A:06:66:ED:28:1C:C2:A4:C9:B3:9A:69:91:09:CF:52:32:B0:B7:A5


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4005: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4006: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4007: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4008: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp       -t RootCA.der
vfychain -d AllDB -pp -vv       EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185175 (0x1ef22317)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:00:48 2017
            Not After : Thu May 19 19:00:48 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:3a:ed:8c:2c:42:16:03:bd:d7:d1:6b:9f:20:b6:92:
                    32:85:61:3b:df:76:84:9a:ad:a1:a4:c8:a4:d6:9c:e9:
                    77:c4:91:32:cf:a2:5a:5c:3d:21:02:e2:48:49:0e:5e:
                    75:a4:7d:56:97:15:aa:9f:c6:26:b4:61:d1:be:57:f8:
                    a0:ab:f9:44:5d:55:7b:a5:73:e7:d3:7e:8d:a5:c5:ee:
                    35:8e:4e:3f:ed:af:8c:e3:2d:03:99:6f:15:37:8b:e6:
                    d2:59:45:2d:13:4b:e0:92:f1:5d:f0:23:7e:94:29:8f:
                    c2:ea:26:bf:c5:8f:ba:16:54:4e:cf:8d:1f:04:c5:48:
                    ff:3f:e9:b2:d1:a3:8b:54:96:df:77:47:a3:58:4a:0d:
                    33:c8:0c:25:1c:20:22:23:ba:08:86:d6:75:77:8e:25:
                    f4:8c:92:c4:22:14:2f:0c:56:3a:21:d1:77:7f:90:f4:
                    7a:14:24:1d:21:73:f5:e7:4d:c5:c1:e2:8c:f4:11:78:
                    9e:e6:be:e2:56:39:51:31:5f:35:3f:5e:46:62:ba:68:
                    b8:8b:af:57:a2:65:9b:1b:38:27:5d:72:81:ac:88:dc:
                    fd:2a:e3:0a:1a:78:08:9c:66:75:d2:55:58:b0:11:45:
                    d1:f8:8f:4d:39:a1:1f:8d:0a:21:d4:ee:2c:f3:08:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        4e:bf:a3:8b:56:f9:e4:30:ef:8d:06:50:c7:42:92:68:
        68:da:f2:af:2e:9c:be:45:b4:57:ad:d7:e9:b6:c9:07:
        f7:54:77:6b:50:a7:fc:f6:78:d1:ff:6e:9b:10:8d:97:
        c6:da:c7:ff:f7:d9:c3:7e:92:b7:b5:1d:00:ed:44:7d:
        4b:a9:a7:28:89:11:6f:d7:17:bb:e4:d9:76:e7:af:6f:
        34:e2:e8:da:44:e9:39:54:1c:e2:69:1f:2c:38:20:80:
        f7:9f:f7:7f:89:55:cf:45:b6:4d:43:6f:53:34:94:7c:
        73:21:8a:db:70:15:64:76:95:52:f2:f8:08:1b:2b:3a:
        37:b5:e2:3c:f2:cf:95:e9:54:88:e9:71:f6:04:d5:aa:
        0f:fb:b8:29:6c:08:45:c9:19:f5:c2:8a:cc:82:10:ae:
        2f:48:cb:2f:3b:d7:13:e3:58:b6:7a:a5:16:df:3f:cf:
        2d:84:03:3a:48:15:d3:d3:91:63:46:d9:14:4b:87:eb:
        94:5f:3b:58:23:a4:4d:99:af:af:69:18:73:41:bc:6d:
        14:c6:7b:7b:5b:93:84:4a:68:7b:79:14:90:9c:8d:df:
        56:54:ae:b3:17:f8:85:b7:14:71:19:eb:58:26:08:ab:
        69:af:ec:8a:9b:7b:b3:6e:ee:db:73:38:ed:53:cc:bd
    Fingerprint (SHA-256):
        28:EB:D6:F6:1A:C7:B9:32:F7:2A:8F:F2:FE:CC:CB:3F:74:AA:3A:CA:B0:A4:13:47:5C:57:FF:BB:17:1C:E7:59
    Fingerprint (SHA1):
        0A:06:66:ED:28:1C:C2:A4:C9:B3:9A:69:91:09:CF:52:32:B0:B7:A5


Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US"
Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US"
Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4009: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp       -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185175 (0x1ef22317)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:00:48 2017
            Not After : Thu May 19 19:00:48 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:3a:ed:8c:2c:42:16:03:bd:d7:d1:6b:9f:20:b6:92:
                    32:85:61:3b:df:76:84:9a:ad:a1:a4:c8:a4:d6:9c:e9:
                    77:c4:91:32:cf:a2:5a:5c:3d:21:02:e2:48:49:0e:5e:
                    75:a4:7d:56:97:15:aa:9f:c6:26:b4:61:d1:be:57:f8:
                    a0:ab:f9:44:5d:55:7b:a5:73:e7:d3:7e:8d:a5:c5:ee:
                    35:8e:4e:3f:ed:af:8c:e3:2d:03:99:6f:15:37:8b:e6:
                    d2:59:45:2d:13:4b:e0:92:f1:5d:f0:23:7e:94:29:8f:
                    c2:ea:26:bf:c5:8f:ba:16:54:4e:cf:8d:1f:04:c5:48:
                    ff:3f:e9:b2:d1:a3:8b:54:96:df:77:47:a3:58:4a:0d:
                    33:c8:0c:25:1c:20:22:23:ba:08:86:d6:75:77:8e:25:
                    f4:8c:92:c4:22:14:2f:0c:56:3a:21:d1:77:7f:90:f4:
                    7a:14:24:1d:21:73:f5:e7:4d:c5:c1:e2:8c:f4:11:78:
                    9e:e6:be:e2:56:39:51:31:5f:35:3f:5e:46:62:ba:68:
                    b8:8b:af:57:a2:65:9b:1b:38:27:5d:72:81:ac:88:dc:
                    fd:2a:e3:0a:1a:78:08:9c:66:75:d2:55:58:b0:11:45:
                    d1:f8:8f:4d:39:a1:1f:8d:0a:21:d4:ee:2c:f3:08:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        4e:bf:a3:8b:56:f9:e4:30:ef:8d:06:50:c7:42:92:68:
        68:da:f2:af:2e:9c:be:45:b4:57:ad:d7:e9:b6:c9:07:
        f7:54:77:6b:50:a7:fc:f6:78:d1:ff:6e:9b:10:8d:97:
        c6:da:c7:ff:f7:d9:c3:7e:92:b7:b5:1d:00:ed:44:7d:
        4b:a9:a7:28:89:11:6f:d7:17:bb:e4:d9:76:e7:af:6f:
        34:e2:e8:da:44:e9:39:54:1c:e2:69:1f:2c:38:20:80:
        f7:9f:f7:7f:89:55:cf:45:b6:4d:43:6f:53:34:94:7c:
        73:21:8a:db:70:15:64:76:95:52:f2:f8:08:1b:2b:3a:
        37:b5:e2:3c:f2:cf:95:e9:54:88:e9:71:f6:04:d5:aa:
        0f:fb:b8:29:6c:08:45:c9:19:f5:c2:8a:cc:82:10:ae:
        2f:48:cb:2f:3b:d7:13:e3:58:b6:7a:a5:16:df:3f:cf:
        2d:84:03:3a:48:15:d3:d3:91:63:46:d9:14:4b:87:eb:
        94:5f:3b:58:23:a4:4d:99:af:af:69:18:73:41:bc:6d:
        14:c6:7b:7b:5b:93:84:4a:68:7b:79:14:90:9c:8d:df:
        56:54:ae:b3:17:f8:85:b7:14:71:19:eb:58:26:08:ab:
        69:af:ec:8a:9b:7b:b3:6e:ee:db:73:38:ed:53:cc:bd
    Fingerprint (SHA-256):
        28:EB:D6:F6:1A:C7:B9:32:F7:2A:8F:F2:FE:CC:CB:3F:74:AA:3A:CA:B0:A4:13:47:5C:57:FF:BB:17:1C:E7:59
    Fingerprint (SHA1):
        0A:06:66:ED:28:1C:C2:A4:C9:B3:9A:69:91:09:CF:52:32:B0:B7:A5


Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US"
Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4010: AnyPolicyWithLevel: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185175 (0x1ef22317)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:00:48 2017
            Not After : Thu May 19 19:00:48 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:3a:ed:8c:2c:42:16:03:bd:d7:d1:6b:9f:20:b6:92:
                    32:85:61:3b:df:76:84:9a:ad:a1:a4:c8:a4:d6:9c:e9:
                    77:c4:91:32:cf:a2:5a:5c:3d:21:02:e2:48:49:0e:5e:
                    75:a4:7d:56:97:15:aa:9f:c6:26:b4:61:d1:be:57:f8:
                    a0:ab:f9:44:5d:55:7b:a5:73:e7:d3:7e:8d:a5:c5:ee:
                    35:8e:4e:3f:ed:af:8c:e3:2d:03:99:6f:15:37:8b:e6:
                    d2:59:45:2d:13:4b:e0:92:f1:5d:f0:23:7e:94:29:8f:
                    c2:ea:26:bf:c5:8f:ba:16:54:4e:cf:8d:1f:04:c5:48:
                    ff:3f:e9:b2:d1:a3:8b:54:96:df:77:47:a3:58:4a:0d:
                    33:c8:0c:25:1c:20:22:23:ba:08:86:d6:75:77:8e:25:
                    f4:8c:92:c4:22:14:2f:0c:56:3a:21:d1:77:7f:90:f4:
                    7a:14:24:1d:21:73:f5:e7:4d:c5:c1:e2:8c:f4:11:78:
                    9e:e6:be:e2:56:39:51:31:5f:35:3f:5e:46:62:ba:68:
                    b8:8b:af:57:a2:65:9b:1b:38:27:5d:72:81:ac:88:dc:
                    fd:2a:e3:0a:1a:78:08:9c:66:75:d2:55:58:b0:11:45:
                    d1:f8:8f:4d:39:a1:1f:8d:0a:21:d4:ee:2c:f3:08:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        4e:bf:a3:8b:56:f9:e4:30:ef:8d:06:50:c7:42:92:68:
        68:da:f2:af:2e:9c:be:45:b4:57:ad:d7:e9:b6:c9:07:
        f7:54:77:6b:50:a7:fc:f6:78:d1:ff:6e:9b:10:8d:97:
        c6:da:c7:ff:f7:d9:c3:7e:92:b7:b5:1d:00:ed:44:7d:
        4b:a9:a7:28:89:11:6f:d7:17:bb:e4:d9:76:e7:af:6f:
        34:e2:e8:da:44:e9:39:54:1c:e2:69:1f:2c:38:20:80:
        f7:9f:f7:7f:89:55:cf:45:b6:4d:43:6f:53:34:94:7c:
        73:21:8a:db:70:15:64:76:95:52:f2:f8:08:1b:2b:3a:
        37:b5:e2:3c:f2:cf:95:e9:54:88:e9:71:f6:04:d5:aa:
        0f:fb:b8:29:6c:08:45:c9:19:f5:c2:8a:cc:82:10:ae:
        2f:48:cb:2f:3b:d7:13:e3:58:b6:7a:a5:16:df:3f:cf:
        2d:84:03:3a:48:15:d3:d3:91:63:46:d9:14:4b:87:eb:
        94:5f:3b:58:23:a4:4d:99:af:af:69:18:73:41:bc:6d:
        14:c6:7b:7b:5b:93:84:4a:68:7b:79:14:90:9c:8d:df:
        56:54:ae:b3:17:f8:85:b7:14:71:19:eb:58:26:08:ab:
        69:af:ec:8a:9b:7b:b3:6e:ee:db:73:38:ed:53:cc:bd
    Fingerprint (SHA-256):
        28:EB:D6:F6:1A:C7:B9:32:F7:2A:8F:F2:FE:CC:CB:3F:74:AA:3A:CA:B0:A4:13:47:5C:57:FF:BB:17:1C:E7:59
    Fingerprint (SHA1):
        0A:06:66:ED:28:1C:C2:A4:C9:B3:9A:69:91:09:CF:52:32:B0:B7:A5


Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US"
Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4011: AnyPolicyWithLevel: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185175 (0x1ef22317)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:00:48 2017
            Not After : Thu May 19 19:00:48 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:3a:ed:8c:2c:42:16:03:bd:d7:d1:6b:9f:20:b6:92:
                    32:85:61:3b:df:76:84:9a:ad:a1:a4:c8:a4:d6:9c:e9:
                    77:c4:91:32:cf:a2:5a:5c:3d:21:02:e2:48:49:0e:5e:
                    75:a4:7d:56:97:15:aa:9f:c6:26:b4:61:d1:be:57:f8:
                    a0:ab:f9:44:5d:55:7b:a5:73:e7:d3:7e:8d:a5:c5:ee:
                    35:8e:4e:3f:ed:af:8c:e3:2d:03:99:6f:15:37:8b:e6:
                    d2:59:45:2d:13:4b:e0:92:f1:5d:f0:23:7e:94:29:8f:
                    c2:ea:26:bf:c5:8f:ba:16:54:4e:cf:8d:1f:04:c5:48:
                    ff:3f:e9:b2:d1:a3:8b:54:96:df:77:47:a3:58:4a:0d:
                    33:c8:0c:25:1c:20:22:23:ba:08:86:d6:75:77:8e:25:
                    f4:8c:92:c4:22:14:2f:0c:56:3a:21:d1:77:7f:90:f4:
                    7a:14:24:1d:21:73:f5:e7:4d:c5:c1:e2:8c:f4:11:78:
                    9e:e6:be:e2:56:39:51:31:5f:35:3f:5e:46:62:ba:68:
                    b8:8b:af:57:a2:65:9b:1b:38:27:5d:72:81:ac:88:dc:
                    fd:2a:e3:0a:1a:78:08:9c:66:75:d2:55:58:b0:11:45:
                    d1:f8:8f:4d:39:a1:1f:8d:0a:21:d4:ee:2c:f3:08:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        4e:bf:a3:8b:56:f9:e4:30:ef:8d:06:50:c7:42:92:68:
        68:da:f2:af:2e:9c:be:45:b4:57:ad:d7:e9:b6:c9:07:
        f7:54:77:6b:50:a7:fc:f6:78:d1:ff:6e:9b:10:8d:97:
        c6:da:c7:ff:f7:d9:c3:7e:92:b7:b5:1d:00:ed:44:7d:
        4b:a9:a7:28:89:11:6f:d7:17:bb:e4:d9:76:e7:af:6f:
        34:e2:e8:da:44:e9:39:54:1c:e2:69:1f:2c:38:20:80:
        f7:9f:f7:7f:89:55:cf:45:b6:4d:43:6f:53:34:94:7c:
        73:21:8a:db:70:15:64:76:95:52:f2:f8:08:1b:2b:3a:
        37:b5:e2:3c:f2:cf:95:e9:54:88:e9:71:f6:04:d5:aa:
        0f:fb:b8:29:6c:08:45:c9:19:f5:c2:8a:cc:82:10:ae:
        2f:48:cb:2f:3b:d7:13:e3:58:b6:7a:a5:16:df:3f:cf:
        2d:84:03:3a:48:15:d3:d3:91:63:46:d9:14:4b:87:eb:
        94:5f:3b:58:23:a4:4d:99:af:af:69:18:73:41:bc:6d:
        14:c6:7b:7b:5b:93:84:4a:68:7b:79:14:90:9c:8d:df:
        56:54:ae:b3:17:f8:85:b7:14:71:19:eb:58:26:08:ab:
        69:af:ec:8a:9b:7b:b3:6e:ee:db:73:38:ed:53:cc:bd
    Fingerprint (SHA-256):
        28:EB:D6:F6:1A:C7:B9:32:F7:2A:8F:F2:FE:CC:CB:3F:74:AA:3A:CA:B0:A4:13:47:5C:57:FF:BB:17:1C:E7:59
    Fingerprint (SHA1):
        0A:06:66:ED:28:1C:C2:A4:C9:B3:9A:69:91:09:CF:52:32:B0:B7:A5


Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US"
Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4012: AnyPolicyWithLevel: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185175 (0x1ef22317)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:00:48 2017
            Not After : Thu May 19 19:00:48 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:3a:ed:8c:2c:42:16:03:bd:d7:d1:6b:9f:20:b6:92:
                    32:85:61:3b:df:76:84:9a:ad:a1:a4:c8:a4:d6:9c:e9:
                    77:c4:91:32:cf:a2:5a:5c:3d:21:02:e2:48:49:0e:5e:
                    75:a4:7d:56:97:15:aa:9f:c6:26:b4:61:d1:be:57:f8:
                    a0:ab:f9:44:5d:55:7b:a5:73:e7:d3:7e:8d:a5:c5:ee:
                    35:8e:4e:3f:ed:af:8c:e3:2d:03:99:6f:15:37:8b:e6:
                    d2:59:45:2d:13:4b:e0:92:f1:5d:f0:23:7e:94:29:8f:
                    c2:ea:26:bf:c5:8f:ba:16:54:4e:cf:8d:1f:04:c5:48:
                    ff:3f:e9:b2:d1:a3:8b:54:96:df:77:47:a3:58:4a:0d:
                    33:c8:0c:25:1c:20:22:23:ba:08:86:d6:75:77:8e:25:
                    f4:8c:92:c4:22:14:2f:0c:56:3a:21:d1:77:7f:90:f4:
                    7a:14:24:1d:21:73:f5:e7:4d:c5:c1:e2:8c:f4:11:78:
                    9e:e6:be:e2:56:39:51:31:5f:35:3f:5e:46:62:ba:68:
                    b8:8b:af:57:a2:65:9b:1b:38:27:5d:72:81:ac:88:dc:
                    fd:2a:e3:0a:1a:78:08:9c:66:75:d2:55:58:b0:11:45:
                    d1:f8:8f:4d:39:a1:1f:8d:0a:21:d4:ee:2c:f3:08:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        4e:bf:a3:8b:56:f9:e4:30:ef:8d:06:50:c7:42:92:68:
        68:da:f2:af:2e:9c:be:45:b4:57:ad:d7:e9:b6:c9:07:
        f7:54:77:6b:50:a7:fc:f6:78:d1:ff:6e:9b:10:8d:97:
        c6:da:c7:ff:f7:d9:c3:7e:92:b7:b5:1d:00:ed:44:7d:
        4b:a9:a7:28:89:11:6f:d7:17:bb:e4:d9:76:e7:af:6f:
        34:e2:e8:da:44:e9:39:54:1c:e2:69:1f:2c:38:20:80:
        f7:9f:f7:7f:89:55:cf:45:b6:4d:43:6f:53:34:94:7c:
        73:21:8a:db:70:15:64:76:95:52:f2:f8:08:1b:2b:3a:
        37:b5:e2:3c:f2:cf:95:e9:54:88:e9:71:f6:04:d5:aa:
        0f:fb:b8:29:6c:08:45:c9:19:f5:c2:8a:cc:82:10:ae:
        2f:48:cb:2f:3b:d7:13:e3:58:b6:7a:a5:16:df:3f:cf:
        2d:84:03:3a:48:15:d3:d3:91:63:46:d9:14:4b:87:eb:
        94:5f:3b:58:23:a4:4d:99:af:af:69:18:73:41:bc:6d:
        14:c6:7b:7b:5b:93:84:4a:68:7b:79:14:90:9c:8d:df:
        56:54:ae:b3:17:f8:85:b7:14:71:19:eb:58:26:08:ab:
        69:af:ec:8a:9b:7b:b3:6e:ee:db:73:38:ed:53:cc:bd
    Fingerprint (SHA-256):
        28:EB:D6:F6:1A:C7:B9:32:F7:2A:8F:F2:FE:CC:CB:3F:74:AA:3A:CA:B0:A4:13:47:5C:57:FF:BB:17:1C:E7:59
    Fingerprint (SHA1):
        0A:06:66:ED:28:1C:C2:A4:C9:B3:9A:69:91:09:CF:52:32:B0:B7:A5


Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US"
Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4013: AnyPolicyWithLevel: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185175 (0x1ef22317)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:00:48 2017
            Not After : Thu May 19 19:00:48 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:3a:ed:8c:2c:42:16:03:bd:d7:d1:6b:9f:20:b6:92:
                    32:85:61:3b:df:76:84:9a:ad:a1:a4:c8:a4:d6:9c:e9:
                    77:c4:91:32:cf:a2:5a:5c:3d:21:02:e2:48:49:0e:5e:
                    75:a4:7d:56:97:15:aa:9f:c6:26:b4:61:d1:be:57:f8:
                    a0:ab:f9:44:5d:55:7b:a5:73:e7:d3:7e:8d:a5:c5:ee:
                    35:8e:4e:3f:ed:af:8c:e3:2d:03:99:6f:15:37:8b:e6:
                    d2:59:45:2d:13:4b:e0:92:f1:5d:f0:23:7e:94:29:8f:
                    c2:ea:26:bf:c5:8f:ba:16:54:4e:cf:8d:1f:04:c5:48:
                    ff:3f:e9:b2:d1:a3:8b:54:96:df:77:47:a3:58:4a:0d:
                    33:c8:0c:25:1c:20:22:23:ba:08:86:d6:75:77:8e:25:
                    f4:8c:92:c4:22:14:2f:0c:56:3a:21:d1:77:7f:90:f4:
                    7a:14:24:1d:21:73:f5:e7:4d:c5:c1:e2:8c:f4:11:78:
                    9e:e6:be:e2:56:39:51:31:5f:35:3f:5e:46:62:ba:68:
                    b8:8b:af:57:a2:65:9b:1b:38:27:5d:72:81:ac:88:dc:
                    fd:2a:e3:0a:1a:78:08:9c:66:75:d2:55:58:b0:11:45:
                    d1:f8:8f:4d:39:a1:1f:8d:0a:21:d4:ee:2c:f3:08:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        4e:bf:a3:8b:56:f9:e4:30:ef:8d:06:50:c7:42:92:68:
        68:da:f2:af:2e:9c:be:45:b4:57:ad:d7:e9:b6:c9:07:
        f7:54:77:6b:50:a7:fc:f6:78:d1:ff:6e:9b:10:8d:97:
        c6:da:c7:ff:f7:d9:c3:7e:92:b7:b5:1d:00:ed:44:7d:
        4b:a9:a7:28:89:11:6f:d7:17:bb:e4:d9:76:e7:af:6f:
        34:e2:e8:da:44:e9:39:54:1c:e2:69:1f:2c:38:20:80:
        f7:9f:f7:7f:89:55:cf:45:b6:4d:43:6f:53:34:94:7c:
        73:21:8a:db:70:15:64:76:95:52:f2:f8:08:1b:2b:3a:
        37:b5:e2:3c:f2:cf:95:e9:54:88:e9:71:f6:04:d5:aa:
        0f:fb:b8:29:6c:08:45:c9:19:f5:c2:8a:cc:82:10:ae:
        2f:48:cb:2f:3b:d7:13:e3:58:b6:7a:a5:16:df:3f:cf:
        2d:84:03:3a:48:15:d3:d3:91:63:46:d9:14:4b:87:eb:
        94:5f:3b:58:23:a4:4d:99:af:af:69:18:73:41:bc:6d:
        14:c6:7b:7b:5b:93:84:4a:68:7b:79:14:90:9c:8d:df:
        56:54:ae:b3:17:f8:85:b7:14:71:19:eb:58:26:08:ab:
        69:af:ec:8a:9b:7b:b3:6e:ee:db:73:38:ed:53:cc:bd
    Fingerprint (SHA-256):
        28:EB:D6:F6:1A:C7:B9:32:F7:2A:8F:F2:FE:CC:CB:3F:74:AA:3A:CA:B0:A4:13:47:5C:57:FF:BB:17:1C:E7:59
    Fingerprint (SHA1):
        0A:06:66:ED:28:1C:C2:A4:C9:B3:9A:69:91:09:CF:52:32:B0:B7:A5


Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US"
Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US"
Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4014: AnyPolicyWithLevel: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4015: AnyPolicyWithLevel: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4016: explicitPolicy: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185205 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4017: explicitPolicy: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4018: explicitPolicy: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB nonEVCADB
certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd
chains.sh: #4019: explicitPolicy: Creating DB nonEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request nonEVCAReq.der
certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US"  -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o nonEVCAReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4020: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der  - PASSED
chains.sh: Creating certficate nonEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 519185206   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4021: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database
certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4022: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database  - PASSED
chains.sh: Creating DB EVCADB
certutil -N -d EVCADB -f EVCADB/dbpasswd
chains.sh: #4023: explicitPolicy: Creating DB EVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request EVCAReq.der
certutil -s "CN=EVCA Intermediate, O=EVCA, C=US"  -R -2 -d EVCADB -f EVCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EVCAReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4024: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der  - PASSED
chains.sh: Creating certficate EVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 519185207   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4025: explicitPolicy: Creating certficate EVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate EVCARoot.der to EVCADB database
certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4026: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database  - PASSED
chains.sh: Creating DB otherEVCADB
certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd
chains.sh: #4027: explicitPolicy: Creating DB otherEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request otherEVCAReq.der
certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US"  -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o otherEVCAReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4028: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der  - PASSED
chains.sh: Creating certficate otherEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 519185208   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4029: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database
certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4030: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database  - PASSED
chains.sh: Creating DB validEVDB
certutil -N -d validEVDB -f validEVDB/dbpasswd
chains.sh: #4031: explicitPolicy: Creating DB validEVDB  - PASSED
chains.sh: Creating EE certifiate request validEVReq.der
certutil -s "CN=validEV EE, O=validEV, C=US"  -R  -d validEVDB -f validEVDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o validEVReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4032: explicitPolicy: Creating EE certifiate request validEVReq.der  - PASSED
chains.sh: Creating certficate validEVEVCA.der signed by EVCA
certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 519185209   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4033: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA  - PASSED
chains.sh: Importing certificate validEVEVCA.der to validEVDB database
certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4034: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database  - PASSED
chains.sh: Creating DB invalidEVDB
certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd
chains.sh: #4035: explicitPolicy: Creating DB invalidEVDB  - PASSED
chains.sh: Creating EE certifiate request invalidEVReq.der
certutil -s "CN=invalidEV EE, O=invalidEV, C=US"  -R  -d invalidEVDB -f invalidEVDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o invalidEVReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4036: explicitPolicy: Creating EE certifiate request invalidEVReq.der  - PASSED
chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA
certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 519185210   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4037: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA  - PASSED
chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database
certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4038: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database  - PASSED
chains.sh: Creating DB wrongEVOIDDB
certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd
chains.sh: #4039: explicitPolicy: Creating DB wrongEVOIDDB  - PASSED
chains.sh: Creating EE certifiate request wrongEVOIDReq.der
certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US"  -R  -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o wrongEVOIDReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4040: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der  - PASSED
chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA
certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 519185211   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4041: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA  - PASSED
chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database
certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4042: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4043: explicitPolicy: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  validEVEVCA.der EVCARoot.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185205 (0x1ef22335)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:07:44 2017
            Not After : Thu May 19 19:07:44 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d9:64:ec:a6:fb:84:ac:dd:fd:3a:95:f7:be:18:38:56:
                    33:90:a8:93:25:2f:97:0a:83:ee:8b:b5:cf:cf:08:0d:
                    47:26:4e:0b:29:d4:be:58:5f:23:b4:c8:5f:c7:71:5e:
                    43:97:ed:fb:20:2f:ee:ba:f5:3d:86:5c:53:19:0e:42:
                    df:b2:ca:61:a8:e5:0a:a4:b3:2e:0e:d3:de:aa:e4:85:
                    53:65:57:cf:37:46:76:48:61:e3:c4:3f:49:9d:b8:e7:
                    e4:32:99:50:49:cc:65:1f:b5:5e:73:bf:28:61:fa:a8:
                    50:c2:67:40:34:7f:9b:97:02:ef:99:20:67:97:0b:5a:
                    70:0b:a1:1c:37:5f:d5:bd:b3:12:d4:50:b7:d9:29:b9:
                    6b:d7:7d:0d:10:4a:a4:12:80:7c:06:71:5e:7c:e0:8b:
                    3c:a3:83:e3:a0:b6:fe:f2:91:af:d4:ef:82:a7:9f:7c:
                    80:77:ef:3e:7a:77:85:6e:5e:06:ef:57:87:b6:7e:bf:
                    ca:42:74:0c:6c:c2:11:24:4d:d8:45:34:e1:5c:c5:2c:
                    23:a1:eb:6c:a7:eb:41:d2:b4:13:e3:a6:c7:09:3c:9e:
                    b5:58:ee:ca:87:8f:11:61:f9:13:d5:28:f5:f4:2f:e4:
                    8a:1e:0c:ca:a6:8a:9b:34:ae:00:15:d5:f4:b5:c7:1f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9e:f4:03:7b:c2:d9:99:95:4f:c1:5d:37:c7:11:14:6e:
        9f:a2:1e:fa:f4:14:cf:4a:dc:98:d9:d1:07:dc:b4:6b:
        2f:1f:83:85:c2:0f:41:a8:a4:8d:48:ca:c3:66:a6:9b:
        d5:49:b5:c0:e2:58:fc:dd:5e:47:eb:32:69:b0:87:51:
        3e:e7:03:2d:e7:4d:f4:62:9c:db:6a:96:5c:a3:02:93:
        42:ed:79:6c:f3:46:45:f4:0e:f3:69:c2:10:98:33:0c:
        c0:b2:10:8e:c0:03:78:02:4a:85:23:63:c7:c8:f8:27:
        35:8d:1f:43:98:62:8a:73:82:03:15:cf:53:fe:c4:a8:
        10:5c:5d:c4:94:b3:eb:a7:22:a3:d5:e0:e9:98:55:bd:
        57:00:80:15:24:11:0a:ee:1b:51:c7:a0:e5:50:42:98:
        53:76:6a:c9:7a:df:b2:82:19:dc:1e:e1:9e:66:b8:71:
        bd:f5:1b:8c:ee:21:d7:9f:9b:7b:95:f3:61:b9:4f:f1:
        b3:2c:e9:c8:3e:93:7f:ce:fa:76:67:12:57:04:d8:3b:
        05:91:35:07:48:42:a0:ff:d7:37:df:2b:f8:c0:f3:39:
        6e:c9:bb:9c:59:e9:b5:20:38:68:d1:b2:de:ed:5b:ec:
        4e:f9:4b:0d:0c:ca:e3:56:0b:b8:4d:80:88:50:e3:61
    Fingerprint (SHA-256):
        D0:29:33:55:59:57:75:D3:8B:5D:9C:E0:A0:78:31:BE:FF:42:BA:63:00:AF:90:67:12:63:37:CF:30:64:69:49
    Fingerprint (SHA1):
        C0:1A:9A:4A:F9:A9:9A:36:A5:01:E7:2F:C1:14:CE:51:38:61:ED:96


Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #4044: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4045: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4046: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #4047: explicitPolicy: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags -d AllDB -pp      -o OID.1.0 
vfychain -d AllDB -pp -vv      -o OID.1.0  validEVEVCA.der EVCARoot.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185205 (0x1ef22335)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:07:44 2017
            Not After : Thu May 19 19:07:44 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d9:64:ec:a6:fb:84:ac:dd:fd:3a:95:f7:be:18:38:56:
                    33:90:a8:93:25:2f:97:0a:83:ee:8b:b5:cf:cf:08:0d:
                    47:26:4e:0b:29:d4:be:58:5f:23:b4:c8:5f:c7:71:5e:
                    43:97:ed:fb:20:2f:ee:ba:f5:3d:86:5c:53:19:0e:42:
                    df:b2:ca:61:a8:e5:0a:a4:b3:2e:0e:d3:de:aa:e4:85:
                    53:65:57:cf:37:46:76:48:61:e3:c4:3f:49:9d:b8:e7:
                    e4:32:99:50:49:cc:65:1f:b5:5e:73:bf:28:61:fa:a8:
                    50:c2:67:40:34:7f:9b:97:02:ef:99:20:67:97:0b:5a:
                    70:0b:a1:1c:37:5f:d5:bd:b3:12:d4:50:b7:d9:29:b9:
                    6b:d7:7d:0d:10:4a:a4:12:80:7c:06:71:5e:7c:e0:8b:
                    3c:a3:83:e3:a0:b6:fe:f2:91:af:d4:ef:82:a7:9f:7c:
                    80:77:ef:3e:7a:77:85:6e:5e:06:ef:57:87:b6:7e:bf:
                    ca:42:74:0c:6c:c2:11:24:4d:d8:45:34:e1:5c:c5:2c:
                    23:a1:eb:6c:a7:eb:41:d2:b4:13:e3:a6:c7:09:3c:9e:
                    b5:58:ee:ca:87:8f:11:61:f9:13:d5:28:f5:f4:2f:e4:
                    8a:1e:0c:ca:a6:8a:9b:34:ae:00:15:d5:f4:b5:c7:1f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9e:f4:03:7b:c2:d9:99:95:4f:c1:5d:37:c7:11:14:6e:
        9f:a2:1e:fa:f4:14:cf:4a:dc:98:d9:d1:07:dc:b4:6b:
        2f:1f:83:85:c2:0f:41:a8:a4:8d:48:ca:c3:66:a6:9b:
        d5:49:b5:c0:e2:58:fc:dd:5e:47:eb:32:69:b0:87:51:
        3e:e7:03:2d:e7:4d:f4:62:9c:db:6a:96:5c:a3:02:93:
        42:ed:79:6c:f3:46:45:f4:0e:f3:69:c2:10:98:33:0c:
        c0:b2:10:8e:c0:03:78:02:4a:85:23:63:c7:c8:f8:27:
        35:8d:1f:43:98:62:8a:73:82:03:15:cf:53:fe:c4:a8:
        10:5c:5d:c4:94:b3:eb:a7:22:a3:d5:e0:e9:98:55:bd:
        57:00:80:15:24:11:0a:ee:1b:51:c7:a0:e5:50:42:98:
        53:76:6a:c9:7a:df:b2:82:19:dc:1e:e1:9e:66:b8:71:
        bd:f5:1b:8c:ee:21:d7:9f:9b:7b:95:f3:61:b9:4f:f1:
        b3:2c:e9:c8:3e:93:7f:ce:fa:76:67:12:57:04:d8:3b:
        05:91:35:07:48:42:a0:ff:d7:37:df:2b:f8:c0:f3:39:
        6e:c9:bb:9c:59:e9:b5:20:38:68:d1:b2:de:ed:5b:ec:
        4e:f9:4b:0d:0c:ca:e3:56:0b:b8:4d:80:88:50:e3:61
    Fingerprint (SHA-256):
        D0:29:33:55:59:57:75:D3:8B:5D:9C:E0:A0:78:31:BE:FF:42:BA:63:00:AF:90:67:12:63:37:CF:30:64:69:49
    Fingerprint (SHA1):
        C0:1A:9A:4A:F9:A9:9A:36:A5:01:E7:2F:C1:14:CE:51:38:61:ED:96

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #4048: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags -d AllDB -pp      -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp      -o OID.1.0 
vfychain -d AllDB -pp -vv      -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4049: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp      -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp      -o OID.1.0 
vfychain -d AllDB -pp -vv      -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4050: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp      -o OID.1.0  - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4051: Mapping: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185212 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4052: Mapping: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4053: Mapping: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4054: Mapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4055: Mapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 519185213   --extCP --extPM < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #4056: Mapping: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4057: Mapping: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4058: Mapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4059: Mapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 519185214   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4060: Mapping: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4061: Mapping: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #4062: Mapping: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4063: Mapping: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 519185215   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4064: Mapping: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4065: Mapping: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4066: Mapping: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #4067: Mapping: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #4068: Mapping: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #4069: Mapping: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185212 (0x1ef2233c)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:08:49 2017
            Not After : Thu May 19 19:08:49 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d2:bb:74:ab:b4:81:91:24:8c:d2:d1:3f:06:42:15:c1:
                    42:c8:f5:9a:b6:84:bc:49:0f:5a:99:ad:14:c6:b3:cd:
                    5f:31:a3:2e:77:fd:f2:7b:a2:8f:27:81:ab:f6:d1:77:
                    f0:61:1f:9e:40:d2:54:f3:9b:8d:ef:2c:f4:be:75:c3:
                    f2:d4:0c:95:64:4f:8f:f2:df:93:b0:49:33:69:3a:a3:
                    48:72:e6:e5:aa:8f:84:68:39:6b:b5:86:9b:99:b9:9b:
                    4e:82:bb:b3:5a:fc:6f:cc:05:bb:08:fa:52:c9:36:bd:
                    b7:c7:b3:bd:81:bb:0c:a6:27:44:bb:9a:19:69:e3:41:
                    52:eb:fd:22:cf:8e:49:cb:82:aa:d3:e1:98:53:b0:ef:
                    b6:c8:25:2a:d9:b7:a3:a5:1e:cf:f2:9d:3f:18:7f:0b:
                    44:50:26:e1:15:39:67:88:3f:26:a1:51:5e:a7:9e:ce:
                    e3:99:0d:3d:c0:8f:83:0f:1e:bf:37:0c:72:08:54:d0:
                    83:da:c1:c6:ee:9d:0f:c6:5e:0b:2b:a8:83:d7:ba:30:
                    29:dc:d6:bb:c0:82:72:da:0b:b7:99:19:77:28:dc:14:
                    2e:ca:47:eb:8a:cc:03:0e:09:2c:22:b5:4e:c9:19:51:
                    c2:ba:97:ef:b3:b2:ec:b9:3f:b7:d4:85:55:d7:6d:b7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        28:b2:f9:e1:52:af:e7:70:93:80:bc:94:94:98:fd:a9:
        01:b8:5c:87:cb:0e:44:32:0a:ca:06:ef:34:69:8a:56:
        36:8d:ae:6c:9e:b8:de:96:d6:d6:17:a9:75:87:6c:fc:
        4e:43:8b:64:b7:aa:77:8c:8c:e8:6e:b6:22:e1:bb:10:
        d8:40:b4:00:fe:9d:f1:bf:ae:37:00:50:e9:53:1b:3e:
        18:56:a0:cc:0b:f1:7d:a0:dc:15:d6:c4:ff:66:25:e7:
        3c:76:96:50:d5:28:9b:78:75:a6:f7:4a:a4:6f:ac:e3:
        a6:96:f3:ef:9e:eb:64:cf:9f:23:7c:c4:95:0a:58:ca:
        49:a3:8a:8d:89:28:f4:1f:20:c9:9d:16:2f:ae:3a:f0:
        6d:1c:f2:91:e5:3a:f6:f9:a0:c3:fd:86:97:e0:8c:43:
        0e:52:a6:e4:7d:ea:9a:05:be:a8:52:86:ad:0c:9c:ca:
        fd:33:07:1f:a6:29:2e:7c:e4:69:a5:51:e7:e4:c8:de:
        14:d0:c5:eb:a3:0d:20:a9:dc:56:93:1d:e1:8e:33:48:
        5c:b3:42:85:69:a6:f0:63:1f:e8:ba:b0:13:bd:60:f0:
        16:06:c2:ee:54:1e:c7:dd:c0:c6:d9:61:ca:ac:bc:53:
        9f:9b:56:19:33:13:1f:22:f8:e1:95:a6:75:18:df:d2
    Fingerprint (SHA-256):
        9D:A5:8A:1F:AA:99:93:3D:EB:B7:B4:1E:9F:F4:79:D7:0C:98:5C:23:E6:18:59:13:E3:4C:03:27:B4:1E:D6:50
    Fingerprint (SHA1):
        60:A4:9E:DD:40:53:7E:34:0A:ED:09:45:06:07:62:20:39:DE:0A:14

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4070: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4071: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4072: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185213 (0x1ef2233d)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:09:11 2017
            Not After : Thu May 19 19:09:11 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9e:26:2e:6e:cd:db:f3:71:e5:a5:50:88:14:24:e9:11:
                    f1:d2:59:82:27:9a:98:5d:56:34:df:81:ec:1f:07:45:
                    13:23:fd:86:b5:97:94:81:3e:da:7b:5a:be:f1:c9:38:
                    3a:62:8b:1c:48:ac:cf:46:1c:88:af:30:0e:5f:21:91:
                    6e:e0:9d:b1:22:3b:ab:ae:bc:cd:a1:b2:a8:87:46:e2:
                    59:e6:69:e7:0d:ba:ce:96:a8:68:1a:6b:f2:27:84:7b:
                    45:17:20:ad:06:28:65:07:79:39:ce:e7:cf:c1:13:84:
                    2a:c4:81:39:17:4d:81:99:d8:78:ed:6e:79:7a:f0:9d:
                    b5:c8:8c:50:52:22:b6:b8:24:4f:76:7e:a0:00:7f:49:
                    56:b9:e6:c8:d8:86:4f:20:b2:8a:f7:ff:18:27:73:ad:
                    d9:4e:e1:a3:6c:5c:d8:11:12:ce:91:da:69:f9:6f:83:
                    6f:2d:11:09:78:0a:f9:01:48:8e:49:82:22:88:0f:48:
                    eb:ed:d1:fb:d3:6c:fb:4a:cf:2d:ec:a8:a8:3c:d4:1f:
                    f6:56:b6:11:61:3c:4b:7b:ac:28:e6:95:44:ae:28:d9:
                    34:13:77:22:f3:c8:a0:ab:75:74:d1:3d:65:55:ff:dc:
                    1b:6c:8c:02:ea:95:0d:38:d0:b4:d6:e1:77:3e:b7:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        b0:5c:f0:57:c9:7b:ad:c0:3c:58:78:a5:e1:1e:b0:8f:
        a1:8c:57:9a:fc:5a:98:c9:e1:a8:b3:11:e1:41:d4:0a:
        bd:69:70:05:b1:02:3a:44:3a:04:20:d6:54:1c:7e:84:
        bd:7d:f0:85:ad:25:1d:13:da:2b:f3:f8:ef:d3:7d:f5:
        8b:8d:0c:13:35:d6:4b:61:f9:4b:f3:f3:d7:68:11:fe:
        6f:79:95:80:1c:7a:05:2e:38:63:b9:ff:a6:29:97:b4:
        2d:f9:6b:29:78:82:13:9f:c1:7f:ea:2e:d6:00:11:f8:
        dc:32:3e:ed:02:09:35:05:76:a6:12:7d:74:4b:3e:7a:
        79:aa:d3:49:a0:14:cf:38:e3:88:fb:a9:cc:54:32:dd:
        78:da:04:55:8f:b1:f0:34:08:ac:ff:34:bb:f0:fc:45:
        a3:9b:37:03:eb:51:77:8f:bb:4b:c0:11:11:da:90:73:
        4e:fc:2f:63:ad:35:08:b5:20:49:25:e7:99:0f:01:de:
        b5:19:d0:52:1a:af:76:24:c3:70:df:b0:f3:50:9b:84:
        83:6d:bc:88:b5:2d:1b:96:30:4e:3b:b8:4e:8e:bf:b3:
        9d:0c:26:06:87:80:e1:45:19:a1:af:96:d2:45:b8:e8:
        94:0b:83:6e:fa:8c:d6:5e:01:cc:e6:46:1d:4d:9a:9a
    Fingerprint (SHA-256):
        5F:8D:7C:59:4D:D8:8B:6D:88:51:B5:04:86:10:06:09:FE:7C:B4:FB:F6:1C:C5:5C:B1:3E:7E:50:A5:3F:F2:6C
    Fingerprint (SHA1):
        82:B9:70:A6:54:6B:DB:A6:14:AC:03:4E:96:A9:E7:F9:95:35:AD:66

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4073: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4074: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185214 (0x1ef2233e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 19:09:20 2017
            Not After : Thu May 19 19:09:20 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:e4:e9:5b:5b:5a:76:c5:0a:a1:89:fe:2d:fe:87:a9:
                    4a:df:2b:8f:64:89:04:ef:59:71:2a:b8:2d:cf:6a:66:
                    e4:ec:81:42:f6:b8:4c:f9:10:ea:15:4c:6b:a6:dc:2e:
                    2a:1e:37:08:06:9c:4b:c2:50:f2:d5:4c:2c:bd:55:af:
                    b1:81:1f:35:7c:c2:66:0a:fa:5c:e1:96:35:74:48:2b:
                    ad:46:23:28:1e:fb:bb:be:1f:c8:2a:9b:7a:ae:f9:19:
                    4e:3b:a9:c1:69:6d:44:00:d9:27:88:5b:9a:18:7c:25:
                    4d:40:b5:32:ed:e1:0b:a8:60:bf:f6:25:af:2a:c1:49:
                    f6:7e:19:65:fa:cb:ec:cb:e8:dc:85:2b:98:e7:fa:03:
                    d6:c8:32:85:0c:88:d9:c0:c4:7d:c0:a1:4b:df:44:34:
                    75:cf:90:db:1c:df:8b:57:50:3e:61:53:ff:5d:46:16:
                    5c:1d:3d:cd:40:52:28:4f:d2:2e:fb:7b:35:45:bb:05:
                    90:a8:d0:f8:de:40:2d:58:1a:0c:f4:5d:7e:a9:79:e0:
                    f7:92:d9:37:1e:9e:c7:cf:5d:64:55:fa:2f:c5:b5:3d:
                    db:54:8e:49:3b:f9:03:d0:dc:da:3b:9e:4b:76:18:11:
                    1d:77:19:3c:a1:5f:63:bd:fe:ce:d5:0d:6c:50:e6:25
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9d:8d:76:9d:30:94:9a:3e:3a:dc:ea:29:da:84:fa:16:
        fd:08:4d:fb:97:2e:11:6b:c5:9b:fd:68:e3:48:cc:33:
        18:89:3b:72:e4:99:32:0f:26:d3:5a:02:11:b1:e0:65:
        c2:01:53:91:13:92:5d:44:18:d1:af:c1:f9:e7:fe:7f:
        7b:c9:bc:c9:92:d2:10:d1:2b:84:e0:a8:71:e5:c7:6d:
        de:9f:d2:cb:25:6c:17:4f:32:2f:d8:a5:7d:06:a2:ed:
        7b:84:42:f6:ea:36:3c:97:e3:58:9a:2a:00:7d:c1:16:
        81:64:90:18:3f:86:c1:c3:e6:13:ce:6b:6e:83:98:72:
        37:ad:a8:0b:d3:27:15:70:d0:d4:0f:54:d2:1a:b5:a5:
        50:81:f6:3e:c4:7d:1d:f2:6f:ea:3e:57:3c:71:f0:3e:
        16:19:59:44:a9:80:d0:b6:ca:03:d6:3f:a4:d9:0b:bd:
        09:af:c8:71:ab:eb:86:cb:85:22:c1:9f:08:4b:de:cc:
        48:19:92:e5:78:75:ac:8c:78:a0:32:af:8d:e4:a6:07:
        f2:e2:e4:fd:81:97:13:2d:01:ea:43:fc:40:c7:47:d0:
        f5:71:cf:1b:05:2f:a2:7f:69:6b:ab:b3:10:23:43:44:
        0e:6d:18:58:29:0c:a5:94:17:b5:d8:2e:15:86:ea:44
    Fingerprint (SHA-256):
        DD:B3:F1:B3:AE:62:E1:62:37:E5:67:B7:33:55:CC:9D:AE:B0:15:5D:95:26:51:71:8B:5A:53:4A:D1:55:AD:09
    Fingerprint (SHA1):
        8D:A9:4B:EC:F6:DF:ED:3A:F6:C4:A3:BE:08:8E:C0:A0:BF:D1:E3:B9

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #4075: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4076: Mapping2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185216 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4077: Mapping2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4078: Mapping2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4079: Mapping2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4080: Mapping2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 519185217   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4081: Mapping2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4082: Mapping2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4083: Mapping2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4084: Mapping2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 519185218   --extCP --extPM < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #4085: Mapping2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4086: Mapping2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #4087: Mapping2: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4088: Mapping2: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 519185219   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4089: Mapping2: Creating certficate CA3CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate CA3CA2.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4090: Mapping2: Importing certificate CA3CA2.der to CA3DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #4091: Mapping2: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4092: Mapping2: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 519185220   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4093: Mapping2: Creating certficate UserCA3.der signed by CA3  - PASSED
chains.sh: Importing certificate UserCA3.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4094: Mapping2: Importing certificate UserCA3.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4095: Mapping2: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #4096: Mapping2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #4097: Mapping2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #4098: Mapping2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA2.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der
chains.sh: #4099: Mapping2: Importing certificate CA3CA2.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA3.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185216 (0x1ef22340)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:09:36 2017
            Not After : Thu May 19 19:09:36 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9d:aa:a4:b6:45:6f:b2:98:68:9f:86:d1:e4:71:ee:92:
                    fd:87:48:ab:9a:df:4c:18:fb:0a:2a:de:b6:d6:ab:c5:
                    b3:02:5f:59:dd:c7:6a:d2:30:de:a9:48:e9:46:19:80:
                    de:f6:c8:e6:04:9c:ee:d0:25:a1:31:e2:9c:43:01:fd:
                    9a:c6:45:d3:90:97:ec:f7:63:c9:32:0c:bf:b2:2e:4e:
                    56:1f:dd:15:96:29:40:79:fb:ce:b3:95:7d:42:00:64:
                    48:a5:86:eb:35:5e:a3:c6:9c:78:a3:68:61:bd:9b:1b:
                    e0:6d:39:c3:20:dd:9d:33:ab:45:d8:74:0b:c8:14:09:
                    ae:57:61:6d:45:89:7f:3d:06:40:48:0b:2f:9a:a1:12:
                    4d:0b:9d:31:65:0a:3c:02:22:20:fe:31:23:f3:e0:1c:
                    2e:4c:12:91:ec:52:01:42:de:b5:21:7d:b0:87:3a:16:
                    41:15:37:21:d1:cf:6a:6d:5b:e0:35:57:b6:5b:5d:dc:
                    10:c9:50:5d:7d:53:36:75:f1:cc:2a:5c:ee:b8:24:ea:
                    e1:43:b8:15:b5:59:a1:56:6e:ea:d3:4d:53:0d:20:94:
                    84:fa:94:ff:09:32:a7:08:f0:4e:3f:f5:6e:d5:a6:5c:
                    97:ce:fe:16:df:98:5f:fc:70:85:4d:c2:cf:15:56:f5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        59:92:72:8e:e3:54:bc:11:99:6b:92:c8:43:3a:90:95:
        74:b6:cd:d3:3b:a1:88:9a:fb:09:00:ef:04:7c:0d:45:
        51:61:be:d3:fa:5f:ca:bd:4e:cf:b8:39:20:d1:ba:14:
        54:e0:b8:45:88:a5:f1:37:bd:69:1e:b9:12:d5:1d:d5:
        be:8c:89:52:9c:6a:8a:fa:b4:b1:bf:44:ef:e4:dd:f2:
        21:ed:b9:a2:41:15:3e:68:14:05:5a:ff:27:2e:bc:91:
        f4:05:32:a4:01:76:49:87:00:94:44:97:78:40:37:4f:
        8e:df:56:87:9f:32:27:a2:6b:ba:03:e1:22:78:f5:10:
        00:f4:f1:13:13:f0:34:7c:08:56:41:6c:ee:5a:80:a1:
        9d:75:71:db:78:c0:2d:7e:5a:24:45:39:ed:8a:21:cc:
        66:b1:28:df:d5:4c:3c:85:e9:c6:1c:70:34:4b:09:52:
        8a:ca:a9:7a:a7:05:50:6b:49:59:af:04:45:a2:81:94:
        04:b5:ec:c4:05:b7:83:31:c1:6a:90:d2:c5:9d:1c:73:
        43:d0:a6:a6:7e:75:a6:1d:53:e7:5e:45:32:c2:75:05:
        b2:ca:56:5c:fa:27:11:83:89:42:bf:56:86:4c:14:31:
        f5:93:ed:f6:13:6d:0e:5b:9a:7c:9b:8e:9f:42:c9:69
    Fingerprint (SHA-256):
        00:14:18:DD:BB:CB:85:77:66:E8:3C:F8:C7:2C:A5:48:77:74:8E:3A:85:7C:A4:42:26:3E:FA:C2:5B:0B:85:6E
    Fingerprint (SHA1):
        E8:2F:84:24:8A:F7:92:B7:0E:AF:38:83:08:7D:E9:75:DE:29:20:12

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4100: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA3.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4101: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA3.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185217 (0x1ef22341)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:09:58 2017
            Not After : Thu May 19 19:09:58 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d6:8d:e7:27:4b:83:c0:7e:cf:ea:ba:89:b8:8f:24:80:
                    8b:7c:b5:9a:1a:d7:76:bb:6b:57:fa:cd:eb:1a:14:89:
                    01:32:f2:c3:15:77:64:a6:11:bd:3b:fc:9a:33:61:1b:
                    66:31:6c:2e:a1:7f:a0:14:95:a9:9b:87:7f:4a:44:2d:
                    af:7a:de:81:43:b3:7e:57:a8:9b:be:75:4f:46:86:82:
                    6b:4d:7a:b1:90:4c:d4:04:89:59:d5:77:a4:5a:d8:e1:
                    8e:69:b5:b2:52:ca:86:33:8b:56:8a:5f:80:ca:e9:02:
                    71:d5:a3:3a:f8:c1:ca:2b:f5:57:89:a5:3e:90:88:91:
                    32:3a:79:81:37:b7:60:90:33:a5:5f:46:de:54:62:cc:
                    fd:1c:bd:13:6f:b0:21:de:5b:b2:4a:b3:1c:64:47:b3:
                    26:34:43:01:ab:2f:c0:76:a2:c2:01:87:21:68:43:7e:
                    07:66:5d:d7:03:5c:05:65:36:da:f8:47:fc:7e:80:69:
                    2f:51:7b:a1:ab:a3:e7:5a:44:a8:53:bb:c8:e7:f7:3f:
                    da:18:c3:29:df:20:b5:a8:1a:d8:f2:43:6f:71:58:bc:
                    6a:da:ad:8a:8d:2f:90:69:99:4a:bc:2b:62:c7:d5:ff:
                    90:74:24:13:91:ec:dc:e4:0c:06:7b:00:e5:71:05:8d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:97:ae:e1:b2:8e:88:bf:a8:56:48:82:f2:f5:7f:74:
        02:6f:ae:12:95:29:d6:06:49:b8:98:59:c2:71:2d:f5:
        25:77:9f:bd:6c:32:88:6c:45:e2:bb:58:b8:8f:a1:ed:
        38:ee:ed:d7:c2:14:56:04:3f:c6:fb:7d:06:90:a5:4a:
        81:7a:9b:9a:20:99:12:08:75:6e:f3:b8:30:ea:75:11:
        e4:b7:15:e3:7b:1b:9e:1e:f0:f5:eb:ef:c7:6b:6b:41:
        79:a1:1d:da:a8:d7:e3:c9:13:98:fe:0c:7e:a4:ae:d0:
        7b:7a:44:97:58:92:5e:a1:b8:39:da:28:1d:26:c2:45:
        da:53:9a:10:ea:c7:fa:f7:b1:37:72:84:b6:22:27:e8:
        63:ac:7c:be:c5:53:a4:f9:73:a6:aa:80:bb:bd:ee:08:
        f4:5d:8f:48:77:9b:cb:7d:7b:12:10:62:91:7d:e6:a9:
        b8:0e:cc:9c:d4:11:40:48:da:18:9a:1b:7c:c4:fd:b5:
        b6:f4:1a:3e:92:5a:71:d8:7b:cf:0e:87:3d:c9:f8:af:
        6e:2f:3c:05:42:28:68:f9:9a:7b:0a:61:41:db:d0:ed:
        6f:d0:88:44:04:98:f9:ba:52:a2:15:48:ba:dc:12:23:
        3b:56:29:b0:68:34:83:07:df:46:94:a4:f5:7d:e1:a4
    Fingerprint (SHA-256):
        7D:7C:55:DB:9F:69:9F:89:1E:0E:07:CE:37:FC:31:F8:CC:5A:D5:82:31:0D:88:14:87:9C:F7:09:D5:44:6E:3F
    Fingerprint (SHA1):
        E6:EA:2C:DE:3B:6C:AF:AF:47:1E:1D:C4:EB:4C:2D:58:5C:4D:9B:15

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4102: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA3.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4103: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA3.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4104: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA3.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185218 (0x1ef22342)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 19:10:03 2017
            Not After : Thu May 19 19:10:03 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c0:b3:85:91:42:16:2c:54:6c:2b:5a:a6:01:dc:fd:34:
                    c3:8d:c9:f6:6a:8e:b4:ff:e2:d9:2b:83:23:28:f2:e8:
                    fb:6c:56:55:47:24:e7:51:c2:7e:bf:3d:78:e2:fc:cc:
                    5d:c8:f1:37:90:75:c1:00:bf:34:dc:37:4c:d6:32:46:
                    e7:dc:92:31:70:f1:26:55:8a:43:84:e6:7e:bc:16:03:
                    41:3c:8e:85:c4:d8:f9:29:00:f3:5c:31:4b:ca:df:63:
                    86:f1:c0:a0:72:dc:b5:99:ff:ee:e8:33:94:8b:61:39:
                    2b:64:b9:10:1b:d7:57:e5:5b:e7:28:f0:b0:e6:4b:0a:
                    1a:f3:6a:50:be:c0:61:32:23:45:65:5a:8a:55:7e:d3:
                    dc:41:4e:51:0b:20:86:03:e0:9e:b6:2f:a0:e0:b0:4a:
                    00:59:72:0c:41:af:cc:31:68:d3:bd:7e:5d:29:f6:81:
                    cc:c1:7f:26:4d:d8:3f:f1:94:63:1d:46:96:6b:ab:40:
                    80:07:a4:f6:7b:b3:a2:0a:e4:a5:fb:94:f1:a4:41:2d:
                    83:b6:ca:cd:68:5a:5c:77:20:5d:b4:6e:c7:3a:74:80:
                    e4:48:77:17:4e:f9:ea:8f:56:ab:e0:a7:02:d6:1f:62:
                    00:f0:12:b1:bd:45:4e:36:52:a0:7a:3e:6a:e2:39:37
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        b9:d5:4f:c8:4b:99:0d:06:67:85:00:4a:04:56:90:12:
        f6:08:24:8f:b3:bf:4c:20:10:40:c2:1b:ab:1f:ee:3b:
        f7:0e:4f:73:95:12:3b:72:7f:45:e4:69:ac:3a:2c:56:
        62:0f:14:87:fb:63:b0:f4:f8:d6:82:6f:75:a9:d4:25:
        58:6f:98:a4:80:18:7a:82:22:40:19:88:95:1a:c3:e1:
        fb:2c:99:3d:7d:f3:e1:1a:ae:79:c8:23:fa:30:1e:c9:
        cd:bc:0e:8d:e9:28:3f:95:d3:b8:c4:dd:0c:78:1a:d5:
        a7:da:8c:0b:1d:3d:ec:4a:63:04:65:fd:ab:5d:c5:ae:
        c3:6c:d8:db:c6:6e:9f:c1:04:a6:57:40:81:36:ca:27:
        42:d0:92:31:d1:89:79:0c:ac:31:d0:76:e7:f4:f9:58:
        77:83:b0:6c:a0:bd:39:f3:95:a2:6e:70:28:1f:39:3e:
        0b:d6:14:02:54:d8:36:50:98:87:b1:cb:db:90:22:2c:
        5f:2e:3f:d7:d8:0a:ae:2e:87:04:ff:d9:c0:68:4f:a2:
        02:e0:fb:88:db:c5:eb:75:b7:ea:aa:65:27:76:80:68:
        a9:6b:e8:8a:dc:19:35:c5:97:87:f5:88:60:d3:c4:dc:
        66:8d:0f:37:8f:00:88:3c:71:0f:5a:31:16:5b:7d:a0
    Fingerprint (SHA-256):
        43:45:90:56:4E:08:CD:8D:99:15:1E:6F:D7:97:7E:8C:8D:99:37:E9:8D:7D:E5:27:01:6C:8B:83:CE:EB:05:FF
    Fingerprint (SHA1):
        16:77:A3:14:9C:CB:74:3D:9D:B0:B2:F5:2A:10:09:B7:DA:8C:26:50

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #4105: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4106: AIA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185221 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4107: AIA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4108: AIA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4109: AIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4110: AIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 519185222   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4111: AIA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4112: AIA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4113: AIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4114: AIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 519185223   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-CA1Root-519185130.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4115: AIA: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4116: AIA: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #4117: AIA: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4118: AIA: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 519185224   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4119: AIA: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4120: AIA: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d UserDB -pp       -t Root.der
vfychain -d UserDB -pp -vv       UserCA2.der CA2CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA1 Intermediate,O=CA1,C=US
Returned value is 1, expected result is fail
chains.sh: #4121: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d UserDB -pp       -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d UserDB -pp   -f    -t Root.der
vfychain -d UserDB -pp -vv   -f    UserCA2.der CA2CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185221 (0x1ef22345)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:10:38 2017
            Not After : Thu May 19 19:10:38 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:3d:b3:7a:c0:0c:75:07:da:89:31:35:79:00:91:e0:
                    dd:e2:4e:90:7e:f2:01:e3:22:eb:51:0d:ec:92:87:0f:
                    b5:ef:6c:8a:0e:20:0a:d3:3d:00:ad:12:0b:9c:6f:ce:
                    b4:f3:94:e1:53:28:b1:45:cb:29:7a:fd:ba:e2:21:e5:
                    bb:d3:44:fe:dd:38:53:d0:55:b7:8d:3c:22:0c:6f:92:
                    bb:39:5a:0c:dd:b7:1a:c9:2b:ae:2a:b3:2e:7d:df:07:
                    0c:cd:aa:11:51:b0:b0:d2:1e:b6:7f:5a:2b:d0:27:ff:
                    a2:26:32:eb:34:43:ce:03:8b:98:50:1b:fa:46:fd:f9:
                    a3:6b:e8:45:a3:3b:07:7d:12:b6:04:0a:42:56:37:7f:
                    fe:d8:13:5f:d2:49:e9:3e:13:87:9a:8c:12:6e:bf:17:
                    37:97:b9:58:5d:a6:98:9b:64:81:fc:ef:77:d5:7a:f4:
                    f8:ab:fe:5f:8a:4d:49:62:35:8d:ef:d5:7d:c7:2e:2c:
                    95:2f:9b:ba:b1:15:77:c6:cf:31:e2:75:6a:22:a8:8c:
                    b9:95:29:99:86:3d:c9:9f:9c:75:a9:f8:41:82:5e:0f:
                    bd:17:f1:42:30:5d:1f:00:b0:10:2b:8b:14:da:35:60:
                    15:e3:67:b6:1a:df:ae:1b:da:9b:b3:77:a3:b2:dc:45
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        d0:3d:db:60:d3:c2:ef:5c:44:9a:b3:da:42:b8:e4:b3:
        b7:0a:5e:d2:ee:9c:2a:0c:91:5a:60:0b:f5:2e:42:e6:
        bf:0a:61:ae:43:b3:bf:e2:4d:ee:3e:bd:e3:0f:bd:f4:
        90:c5:d0:66:49:ba:6d:0a:f3:f3:9c:6d:8c:57:f9:2d:
        1e:6f:7a:68:28:32:0a:f5:94:fa:8c:ad:83:f8:66:c1:
        fb:f6:1b:f4:7c:be:3c:e9:5e:45:55:02:ca:40:e3:d3:
        47:36:38:72:03:f6:a3:0b:19:8f:bc:b4:a1:9b:2b:19:
        18:90:e6:f4:c4:8c:af:0a:c2:33:b3:53:ef:4a:ea:74:
        5f:ca:91:67:02:b2:1f:e8:af:0b:98:4c:7a:4a:82:b4:
        3f:20:a7:36:ff:fa:ec:5e:c0:b6:01:2a:99:36:cd:04:
        f9:00:5b:57:a7:ac:d4:80:b6:e8:a4:d2:db:37:33:84:
        2f:7b:a1:0a:ef:70:f8:c6:0c:60:cd:61:36:9f:cc:8b:
        ff:3a:a3:09:a7:a8:55:f3:66:2b:79:30:e3:ac:26:87:
        f7:0a:32:72:fd:bc:73:9d:f3:6e:3d:9f:8d:19:48:9d:
        ba:59:90:ce:78:23:0e:32:96:29:93:8f:db:44:1a:b1:
        a9:50:c3:87:4e:3f:31:a2:02:2b:e7:1d:47:bf:4f:dd
    Fingerprint (SHA-256):
        B4:90:FA:88:E5:9C:1A:EA:A8:70:FA:9E:7F:D0:C4:67:6F:13:C9:FB:05:AF:97:70:67:6F:BB:A2:D0:E4:B6:45
    Fingerprint (SHA1):
        65:EF:BD:30:96:0B:CE:19:B7:3D:2B:2F:0E:17:A5:09:B1:1D:B0:FB


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4122: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d UserDB -pp   -f    -t Root.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #4123: BridgeWithAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185225 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4124: BridgeWithAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #4125: BridgeWithAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #4126: BridgeWithAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185226 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4127: BridgeWithAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #4128: BridgeWithAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #4129: BridgeWithAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4130: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 519185227 -7 Bridge@Army  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4131: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4132: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 519185228 -7 Bridge@Navy  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4133: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4134: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #4135: BridgeWithAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4136: BridgeWithAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4137: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 519185229   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-Bridge-519185131.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4138: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4139: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4140: BridgeWithAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4141: BridgeWithAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 519185230   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4142: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4143: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp       -t Army.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #4144: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp       -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #4145: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185226 (0x1ef2234a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 19:11:31 2017
            Not After : Thu May 19 19:11:31 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b2:52:48:12:c7:4a:b2:8c:e8:6d:91:c0:26:a8:65:a3:
                    7a:86:b3:1a:6f:92:7e:05:62:15:9f:5e:3a:6f:c5:f0:
                    e5:a2:af:12:54:28:16:54:b2:9c:03:80:78:2a:46:98:
                    d3:1e:8e:fc:ea:8f:a7:68:b3:5a:15:59:8a:af:fd:b0:
                    c0:86:c5:ed:d2:8c:27:3a:13:b3:07:61:ad:af:11:55:
                    0e:ce:f5:2e:6a:e8:aa:38:7a:d5:ec:99:db:ea:22:77:
                    3a:0e:86:64:04:f0:47:90:5b:2c:7b:9a:cb:0e:af:76:
                    92:8b:e1:aa:71:b9:89:b1:15:25:59:8a:a7:16:d9:53:
                    85:17:ee:e9:37:bc:e4:42:54:1c:5f:b7:fc:24:77:1b:
                    1c:2b:55:e0:a5:40:f1:eb:78:3a:6f:1a:9e:e3:cd:0c:
                    13:00:f8:a2:27:2c:dc:cd:df:6b:e7:c8:d6:fd:40:2d:
                    2f:c6:51:ac:e9:b2:1d:b1:d2:ac:a8:66:f5:0f:68:64:
                    af:f7:cf:10:9e:49:04:1d:85:07:e9:36:7a:26:29:c7:
                    2f:ba:93:b1:13:9d:98:50:06:e1:3f:c6:53:29:ee:a2:
                    d8:4e:05:c4:32:f6:e6:73:c8:02:69:64:7d:27:d5:e4:
                    32:82:08:c4:be:84:94:16:a0:cb:d2:47:f8:59:99:45
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a4:32:e1:d6:8d:26:0d:c9:0d:e4:3a:5a:7b:ae:d4:12:
        18:fd:a5:ee:ab:73:10:89:84:fc:1b:1a:74:a4:ee:14:
        da:58:df:b3:e2:e8:e5:eb:84:f5:33:a5:2f:ed:7e:96:
        1f:bb:d0:07:5e:4e:2c:c5:a2:52:0e:40:18:41:4b:61:
        a9:d3:7b:9f:e0:44:f4:da:cc:ca:bf:df:4a:5e:fc:be:
        19:44:b0:78:4a:98:8d:50:2e:96:ad:a1:30:5e:b8:48:
        07:d7:dc:fd:d4:1d:ad:77:db:ac:10:3f:20:19:ac:e6:
        00:d6:62:48:0f:08:44:a7:88:0a:04:d9:7a:24:6e:4a:
        f5:a4:eb:94:77:c2:fc:11:79:6c:d7:2a:c3:b2:91:0b:
        eb:6b:02:11:e5:e1:db:54:fc:98:6c:9a:83:0e:1c:91:
        44:2a:da:e2:2a:54:d6:7c:f4:78:10:af:b4:77:85:89:
        35:69:58:af:7f:63:c7:2d:d9:ea:f5:ac:b8:7e:65:07:
        39:f3:09:4a:b9:f7:f2:df:8f:37:31:0e:11:30:38:81:
        84:1f:5c:b9:6a:10:56:51:72:d2:d2:1c:e0:69:e7:9d:
        54:bc:91:7d:19:1c:53:2a:fb:89:36:99:ad:fa:92:bf:
        31:16:a6:3d:43:ae:d2:65:64:fa:19:8c:0b:b9:50:77
    Fingerprint (SHA-256):
        A2:45:A5:6E:D3:DC:07:4B:6B:E8:2B:8E:1B:F8:88:9C:86:3B:D9:40:46:2C:E2:B4:FB:61:B8:43:0B:65:B5:10
    Fingerprint (SHA1):
        94:41:65:A5:51:84:03:21:A7:3B:93:FF:F9:51:46:8C:2A:35:67:44


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4146: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185226 (0x1ef2234a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 19:11:31 2017
            Not After : Thu May 19 19:11:31 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b2:52:48:12:c7:4a:b2:8c:e8:6d:91:c0:26:a8:65:a3:
                    7a:86:b3:1a:6f:92:7e:05:62:15:9f:5e:3a:6f:c5:f0:
                    e5:a2:af:12:54:28:16:54:b2:9c:03:80:78:2a:46:98:
                    d3:1e:8e:fc:ea:8f:a7:68:b3:5a:15:59:8a:af:fd:b0:
                    c0:86:c5:ed:d2:8c:27:3a:13:b3:07:61:ad:af:11:55:
                    0e:ce:f5:2e:6a:e8:aa:38:7a:d5:ec:99:db:ea:22:77:
                    3a:0e:86:64:04:f0:47:90:5b:2c:7b:9a:cb:0e:af:76:
                    92:8b:e1:aa:71:b9:89:b1:15:25:59:8a:a7:16:d9:53:
                    85:17:ee:e9:37:bc:e4:42:54:1c:5f:b7:fc:24:77:1b:
                    1c:2b:55:e0:a5:40:f1:eb:78:3a:6f:1a:9e:e3:cd:0c:
                    13:00:f8:a2:27:2c:dc:cd:df:6b:e7:c8:d6:fd:40:2d:
                    2f:c6:51:ac:e9:b2:1d:b1:d2:ac:a8:66:f5:0f:68:64:
                    af:f7:cf:10:9e:49:04:1d:85:07:e9:36:7a:26:29:c7:
                    2f:ba:93:b1:13:9d:98:50:06:e1:3f:c6:53:29:ee:a2:
                    d8:4e:05:c4:32:f6:e6:73:c8:02:69:64:7d:27:d5:e4:
                    32:82:08:c4:be:84:94:16:a0:cb:d2:47:f8:59:99:45
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a4:32:e1:d6:8d:26:0d:c9:0d:e4:3a:5a:7b:ae:d4:12:
        18:fd:a5:ee:ab:73:10:89:84:fc:1b:1a:74:a4:ee:14:
        da:58:df:b3:e2:e8:e5:eb:84:f5:33:a5:2f:ed:7e:96:
        1f:bb:d0:07:5e:4e:2c:c5:a2:52:0e:40:18:41:4b:61:
        a9:d3:7b:9f:e0:44:f4:da:cc:ca:bf:df:4a:5e:fc:be:
        19:44:b0:78:4a:98:8d:50:2e:96:ad:a1:30:5e:b8:48:
        07:d7:dc:fd:d4:1d:ad:77:db:ac:10:3f:20:19:ac:e6:
        00:d6:62:48:0f:08:44:a7:88:0a:04:d9:7a:24:6e:4a:
        f5:a4:eb:94:77:c2:fc:11:79:6c:d7:2a:c3:b2:91:0b:
        eb:6b:02:11:e5:e1:db:54:fc:98:6c:9a:83:0e:1c:91:
        44:2a:da:e2:2a:54:d6:7c:f4:78:10:af:b4:77:85:89:
        35:69:58:af:7f:63:c7:2d:d9:ea:f5:ac:b8:7e:65:07:
        39:f3:09:4a:b9:f7:f2:df:8f:37:31:0e:11:30:38:81:
        84:1f:5c:b9:6a:10:56:51:72:d2:d2:1c:e0:69:e7:9d:
        54:bc:91:7d:19:1c:53:2a:fb:89:36:99:ad:fa:92:bf:
        31:16:a6:3d:43:ae:d2:65:64:fa:19:8c:0b:b9:50:77
    Fingerprint (SHA-256):
        A2:45:A5:6E:D3:DC:07:4B:6B:E8:2B:8E:1B:F8:88:9C:86:3B:D9:40:46:2C:E2:B4:FB:61:B8:43:0B:65:B5:10
    Fingerprint (SHA1):
        94:41:65:A5:51:84:03:21:A7:3B:93:FF:F9:51:46:8C:2A:35:67:44


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4147: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #4148: BridgeWithHalfAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185231 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4149: BridgeWithHalfAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #4150: BridgeWithHalfAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #4151: BridgeWithHalfAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185232 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4152: BridgeWithHalfAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #4153: BridgeWithHalfAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #4154: BridgeWithHalfAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4155: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 519185233 -7 Bridge@Army  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4156: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4157: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 519185234 -7 Bridge@Navy  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4158: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4159: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #4160: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4161: BridgeWithHalfAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4162: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 519185235   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-Bridge-519185132.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4163: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4164: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4165: BridgeWithHalfAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4166: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 519185236   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4167: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4168: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4169: BridgeWithHalfAIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4170: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 519185237   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-BridgeNavy-519185133.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4171: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4172: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #4173: BridgeWithHalfAIA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4174: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 519185238   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4175: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4176: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp       -t Army.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #4177: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp       -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #4178: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185232 (0x1ef22350)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 19:12:46 2017
            Not After : Thu May 19 19:12:46 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:b1:94:55:1a:24:67:e5:52:7f:ab:13:07:cf:70:f2:
                    34:fe:87:e4:9e:b2:28:76:01:60:b1:d7:42:3d:07:e5:
                    b2:15:fa:7b:64:57:d1:e5:52:a7:35:37:31:ec:0b:76:
                    39:6a:c6:6c:b5:b6:de:dc:41:e6:a9:50:3c:4c:c8:7a:
                    1f:c9:be:02:80:86:09:6c:01:ba:9c:29:3f:df:9b:1b:
                    92:6d:aa:d3:e5:89:54:4f:27:9a:0f:07:4d:6c:8f:55:
                    7e:64:06:5c:84:78:3e:50:01:c1:d9:2b:16:de:3b:22:
                    d7:e7:22:80:50:9d:b8:7a:39:d1:d2:00:52:57:bf:33:
                    a8:5b:e4:dd:c4:e0:ab:df:d8:ef:b3:0c:26:6b:16:6e:
                    d3:02:b7:bd:f6:a3:77:9f:2c:c9:ac:c7:b8:6c:f6:49:
                    ac:81:d1:74:4e:00:38:7d:63:a9:47:8e:cf:21:96:e4:
                    9c:dd:74:08:fa:a8:a6:73:1e:27:29:06:04:90:44:4a:
                    b1:b7:73:48:00:48:a6:3e:9b:26:3b:1d:46:ec:ac:5e:
                    7e:25:be:5b:64:c8:24:37:f4:17:68:cc:f7:1c:6e:50:
                    ac:1b:19:35:9d:8d:58:71:d8:df:6c:3a:11:79:55:b6:
                    07:0f:69:58:19:f1:bf:90:be:75:3f:2e:f1:14:03:0d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        38:ab:93:00:c7:ae:c9:1b:1a:4d:8d:ad:56:1b:0e:2e:
        ec:d6:c2:8c:4f:61:70:3f:ae:68:4c:2c:2b:e2:8b:e9:
        43:82:e9:f6:27:7a:cb:21:d5:a5:ea:f3:01:b6:f1:9f:
        2d:74:c7:bf:63:5f:55:aa:23:aa:53:6c:18:e0:17:f4:
        0e:fe:a3:63:5d:b0:ae:ca:28:16:a8:a6:a8:6b:62:ec:
        9a:53:ad:5f:3c:e8:28:28:e2:1e:98:05:28:de:82:11:
        2d:a2:aa:d6:16:ed:d8:63:0f:06:5c:70:ab:71:13:00:
        0f:a3:6a:45:c6:6a:af:87:8c:22:e8:03:70:b3:e1:e0:
        2f:62:07:1a:94:14:eb:51:64:58:5b:fc:37:12:8d:90:
        77:eb:1e:b2:da:7e:dc:6e:0a:fd:99:25:68:3b:38:97:
        65:e4:e9:7c:6d:99:ad:64:d1:d4:65:5b:f6:21:47:27:
        00:f4:6e:b3:93:b4:83:06:99:5e:15:5b:de:3b:6a:51:
        53:fc:d1:4c:db:59:61:ee:28:d5:39:01:34:d0:40:71:
        e9:c5:8b:8a:3d:f8:b4:34:00:86:a3:78:d5:b2:1e:71:
        84:96:88:bc:5f:37:28:fb:80:1e:52:f9:90:d8:27:94:
        c2:48:87:ea:2a:64:12:bc:5f:a7:74:36:fa:9b:ae:41
    Fingerprint (SHA-256):
        BE:60:6E:E3:BD:BD:77:19:7F:F6:49:94:71:2F:6C:B9:B3:3B:B8:4E:68:27:2F:35:19:51:74:05:11:1D:50:E0
    Fingerprint (SHA1):
        4E:A0:A9:E7:B4:93:00:68:B9:B3:F9:82:30:AD:03:0C:7E:36:34:66


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4179: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185232 (0x1ef22350)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 19:12:46 2017
            Not After : Thu May 19 19:12:46 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:b1:94:55:1a:24:67:e5:52:7f:ab:13:07:cf:70:f2:
                    34:fe:87:e4:9e:b2:28:76:01:60:b1:d7:42:3d:07:e5:
                    b2:15:fa:7b:64:57:d1:e5:52:a7:35:37:31:ec:0b:76:
                    39:6a:c6:6c:b5:b6:de:dc:41:e6:a9:50:3c:4c:c8:7a:
                    1f:c9:be:02:80:86:09:6c:01:ba:9c:29:3f:df:9b:1b:
                    92:6d:aa:d3:e5:89:54:4f:27:9a:0f:07:4d:6c:8f:55:
                    7e:64:06:5c:84:78:3e:50:01:c1:d9:2b:16:de:3b:22:
                    d7:e7:22:80:50:9d:b8:7a:39:d1:d2:00:52:57:bf:33:
                    a8:5b:e4:dd:c4:e0:ab:df:d8:ef:b3:0c:26:6b:16:6e:
                    d3:02:b7:bd:f6:a3:77:9f:2c:c9:ac:c7:b8:6c:f6:49:
                    ac:81:d1:74:4e:00:38:7d:63:a9:47:8e:cf:21:96:e4:
                    9c:dd:74:08:fa:a8:a6:73:1e:27:29:06:04:90:44:4a:
                    b1:b7:73:48:00:48:a6:3e:9b:26:3b:1d:46:ec:ac:5e:
                    7e:25:be:5b:64:c8:24:37:f4:17:68:cc:f7:1c:6e:50:
                    ac:1b:19:35:9d:8d:58:71:d8:df:6c:3a:11:79:55:b6:
                    07:0f:69:58:19:f1:bf:90:be:75:3f:2e:f1:14:03:0d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        38:ab:93:00:c7:ae:c9:1b:1a:4d:8d:ad:56:1b:0e:2e:
        ec:d6:c2:8c:4f:61:70:3f:ae:68:4c:2c:2b:e2:8b:e9:
        43:82:e9:f6:27:7a:cb:21:d5:a5:ea:f3:01:b6:f1:9f:
        2d:74:c7:bf:63:5f:55:aa:23:aa:53:6c:18:e0:17:f4:
        0e:fe:a3:63:5d:b0:ae:ca:28:16:a8:a6:a8:6b:62:ec:
        9a:53:ad:5f:3c:e8:28:28:e2:1e:98:05:28:de:82:11:
        2d:a2:aa:d6:16:ed:d8:63:0f:06:5c:70:ab:71:13:00:
        0f:a3:6a:45:c6:6a:af:87:8c:22:e8:03:70:b3:e1:e0:
        2f:62:07:1a:94:14:eb:51:64:58:5b:fc:37:12:8d:90:
        77:eb:1e:b2:da:7e:dc:6e:0a:fd:99:25:68:3b:38:97:
        65:e4:e9:7c:6d:99:ad:64:d1:d4:65:5b:f6:21:47:27:
        00:f4:6e:b3:93:b4:83:06:99:5e:15:5b:de:3b:6a:51:
        53:fc:d1:4c:db:59:61:ee:28:d5:39:01:34:d0:40:71:
        e9:c5:8b:8a:3d:f8:b4:34:00:86:a3:78:d5:b2:1e:71:
        84:96:88:bc:5f:37:28:fb:80:1e:52:f9:90:d8:27:94:
        c2:48:87:ea:2a:64:12:bc:5f:a7:74:36:fa:9b:ae:41
    Fingerprint (SHA-256):
        BE:60:6E:E3:BD:BD:77:19:7F:F6:49:94:71:2F:6C:B9:B3:3B:B8:4E:68:27:2F:35:19:51:74:05:11:1D:50:E0
    Fingerprint (SHA1):
        4E:A0:A9:E7:B4:93:00:68:B9:B3:F9:82:30:AD:03:0C:7E:36:34:66


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4180: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der BridgeArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=EE2 EE,O=EE2,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA2 Intermediate,O=CA2,C=US
Returned value is 1, expected result is fail
chains.sh: #4181: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185231 (0x1ef2234f)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Fri May 19 19:12:32 2017
            Not After : Thu May 19 19:12:32 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c7:b3:b3:86:e8:db:12:1c:c4:1d:85:fc:77:e1:43:50:
                    da:9c:e2:4a:a9:97:7b:e6:aa:c3:52:16:70:2a:c8:a0:
                    a7:5f:69:9a:7d:75:9f:68:13:22:da:8c:aa:a1:43:78:
                    c3:95:8b:30:2c:da:ee:d4:fb:a6:a4:f9:3e:cc:e2:50:
                    13:93:5b:04:ef:a0:66:b6:ac:56:ac:2c:f8:f3:50:ea:
                    16:eb:57:b6:ec:48:f5:7d:04:ea:83:24:79:c8:76:07:
                    b2:fe:1c:7a:d3:04:57:8e:4f:42:dc:f0:ca:c9:6e:8b:
                    b9:3e:ee:26:fa:69:20:5f:0d:51:95:e5:1e:39:e2:a1:
                    b2:50:98:22:13:80:cb:64:3f:47:b2:19:e6:72:68:21:
                    03:d8:9f:ad:e5:c2:d1:0a:a8:eb:3c:91:49:7b:f5:86:
                    dd:8b:57:01:33:26:10:85:3b:9f:39:b9:bd:f3:75:89:
                    71:c5:48:a1:ae:49:63:fc:13:47:ef:3a:11:7b:96:74:
                    0f:b7:0f:d5:d1:c9:7b:ce:44:ca:94:e2:f4:2b:34:62:
                    a5:90:61:db:ce:07:8a:a6:d4:9d:c0:29:3c:29:b8:63:
                    03:fd:f8:f8:b9:71:61:df:03:0f:2e:ad:53:00:bb:a4:
                    b5:20:ad:de:4b:25:a9:17:d1:11:79:a2:c2:c0:ae:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        3d:a8:64:7b:18:67:fd:44:a8:e8:d6:b5:fa:c1:a9:4c:
        ec:4c:64:01:9b:27:3a:8b:4d:06:da:68:f2:9f:b0:9d:
        d0:f1:c5:42:05:ad:58:75:2f:9e:a3:5f:ca:f1:f5:8a:
        08:aa:a8:43:b4:90:a3:e2:8a:ad:07:0f:b6:7c:0a:29:
        ce:52:11:93:91:d3:b1:bc:b4:31:ee:fc:22:00:65:d7:
        2d:11:ac:13:20:68:08:6d:e7:82:2e:c7:ed:dd:52:37:
        b3:ae:55:80:22:06:9e:eb:7c:a6:02:0c:ec:6e:e0:6f:
        ce:40:e2:95:4c:28:97:e0:ad:e8:7c:31:91:86:96:ca:
        84:28:23:1c:eb:68:4a:9f:42:0e:ad:99:09:e5:73:ae:
        0d:90:2b:b9:f8:25:a2:e4:71:67:c5:15:72:ed:35:88:
        1d:b8:c0:ab:b7:f4:50:cb:2c:c5:a8:06:d6:9f:7e:9e:
        3a:cc:cc:f5:5c:b2:c2:75:2f:db:40:c5:ef:12:2a:80:
        ba:18:8d:d9:c9:fb:f4:d5:11:cf:8a:d1:89:4e:76:ad:
        72:f7:d9:74:64:56:d7:d5:30:67:a9:94:eb:16:f4:ee:
        c3:db:c7:e4:0d:aa:96:e4:77:77:02:83:a2:00:19:18:
        5f:86:67:b4:2a:ab:9f:b2:7f:6a:54:8e:1c:d4:6f:b1
    Fingerprint (SHA-256):
        98:CD:CB:FE:B3:40:A4:7B:22:59:DC:BA:AA:FB:9D:98:6E:18:D3:1F:CE:39:1E:7B:24:E4:C1:AB:6C:64:0F:8B
    Fingerprint (SHA1):
        51:88:51:16:65:79:AB:BB:CD:6B:B4:9B:9E:E5:0E:33:96:8C:9D:AB


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4182: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der CA2Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185232 (0x1ef22350)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 19:12:46 2017
            Not After : Thu May 19 19:12:46 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:b1:94:55:1a:24:67:e5:52:7f:ab:13:07:cf:70:f2:
                    34:fe:87:e4:9e:b2:28:76:01:60:b1:d7:42:3d:07:e5:
                    b2:15:fa:7b:64:57:d1:e5:52:a7:35:37:31:ec:0b:76:
                    39:6a:c6:6c:b5:b6:de:dc:41:e6:a9:50:3c:4c:c8:7a:
                    1f:c9:be:02:80:86:09:6c:01:ba:9c:29:3f:df:9b:1b:
                    92:6d:aa:d3:e5:89:54:4f:27:9a:0f:07:4d:6c:8f:55:
                    7e:64:06:5c:84:78:3e:50:01:c1:d9:2b:16:de:3b:22:
                    d7:e7:22:80:50:9d:b8:7a:39:d1:d2:00:52:57:bf:33:
                    a8:5b:e4:dd:c4:e0:ab:df:d8:ef:b3:0c:26:6b:16:6e:
                    d3:02:b7:bd:f6:a3:77:9f:2c:c9:ac:c7:b8:6c:f6:49:
                    ac:81:d1:74:4e:00:38:7d:63:a9:47:8e:cf:21:96:e4:
                    9c:dd:74:08:fa:a8:a6:73:1e:27:29:06:04:90:44:4a:
                    b1:b7:73:48:00:48:a6:3e:9b:26:3b:1d:46:ec:ac:5e:
                    7e:25:be:5b:64:c8:24:37:f4:17:68:cc:f7:1c:6e:50:
                    ac:1b:19:35:9d:8d:58:71:d8:df:6c:3a:11:79:55:b6:
                    07:0f:69:58:19:f1:bf:90:be:75:3f:2e:f1:14:03:0d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        38:ab:93:00:c7:ae:c9:1b:1a:4d:8d:ad:56:1b:0e:2e:
        ec:d6:c2:8c:4f:61:70:3f:ae:68:4c:2c:2b:e2:8b:e9:
        43:82:e9:f6:27:7a:cb:21:d5:a5:ea:f3:01:b6:f1:9f:
        2d:74:c7:bf:63:5f:55:aa:23:aa:53:6c:18:e0:17:f4:
        0e:fe:a3:63:5d:b0:ae:ca:28:16:a8:a6:a8:6b:62:ec:
        9a:53:ad:5f:3c:e8:28:28:e2:1e:98:05:28:de:82:11:
        2d:a2:aa:d6:16:ed:d8:63:0f:06:5c:70:ab:71:13:00:
        0f:a3:6a:45:c6:6a:af:87:8c:22:e8:03:70:b3:e1:e0:
        2f:62:07:1a:94:14:eb:51:64:58:5b:fc:37:12:8d:90:
        77:eb:1e:b2:da:7e:dc:6e:0a:fd:99:25:68:3b:38:97:
        65:e4:e9:7c:6d:99:ad:64:d1:d4:65:5b:f6:21:47:27:
        00:f4:6e:b3:93:b4:83:06:99:5e:15:5b:de:3b:6a:51:
        53:fc:d1:4c:db:59:61:ee:28:d5:39:01:34:d0:40:71:
        e9:c5:8b:8a:3d:f8:b4:34:00:86:a3:78:d5:b2:1e:71:
        84:96:88:bc:5f:37:28:fb:80:1e:52:f9:90:d8:27:94:
        c2:48:87:ea:2a:64:12:bc:5f:a7:74:36:fa:9b:ae:41
    Fingerprint (SHA-256):
        BE:60:6E:E3:BD:BD:77:19:7F:F6:49:94:71:2F:6C:B9:B3:3B:B8:4E:68:27:2F:35:19:51:74:05:11:1D:50:E0
    Fingerprint (SHA1):
        4E:A0:A9:E7:B4:93:00:68:B9:B3:F9:82:30:AD:03:0C:7E:36:34:66


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4183: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185232 (0x1ef22350)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 19:12:46 2017
            Not After : Thu May 19 19:12:46 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:b1:94:55:1a:24:67:e5:52:7f:ab:13:07:cf:70:f2:
                    34:fe:87:e4:9e:b2:28:76:01:60:b1:d7:42:3d:07:e5:
                    b2:15:fa:7b:64:57:d1:e5:52:a7:35:37:31:ec:0b:76:
                    39:6a:c6:6c:b5:b6:de:dc:41:e6:a9:50:3c:4c:c8:7a:
                    1f:c9:be:02:80:86:09:6c:01:ba:9c:29:3f:df:9b:1b:
                    92:6d:aa:d3:e5:89:54:4f:27:9a:0f:07:4d:6c:8f:55:
                    7e:64:06:5c:84:78:3e:50:01:c1:d9:2b:16:de:3b:22:
                    d7:e7:22:80:50:9d:b8:7a:39:d1:d2:00:52:57:bf:33:
                    a8:5b:e4:dd:c4:e0:ab:df:d8:ef:b3:0c:26:6b:16:6e:
                    d3:02:b7:bd:f6:a3:77:9f:2c:c9:ac:c7:b8:6c:f6:49:
                    ac:81:d1:74:4e:00:38:7d:63:a9:47:8e:cf:21:96:e4:
                    9c:dd:74:08:fa:a8:a6:73:1e:27:29:06:04:90:44:4a:
                    b1:b7:73:48:00:48:a6:3e:9b:26:3b:1d:46:ec:ac:5e:
                    7e:25:be:5b:64:c8:24:37:f4:17:68:cc:f7:1c:6e:50:
                    ac:1b:19:35:9d:8d:58:71:d8:df:6c:3a:11:79:55:b6:
                    07:0f:69:58:19:f1:bf:90:be:75:3f:2e:f1:14:03:0d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        38:ab:93:00:c7:ae:c9:1b:1a:4d:8d:ad:56:1b:0e:2e:
        ec:d6:c2:8c:4f:61:70:3f:ae:68:4c:2c:2b:e2:8b:e9:
        43:82:e9:f6:27:7a:cb:21:d5:a5:ea:f3:01:b6:f1:9f:
        2d:74:c7:bf:63:5f:55:aa:23:aa:53:6c:18:e0:17:f4:
        0e:fe:a3:63:5d:b0:ae:ca:28:16:a8:a6:a8:6b:62:ec:
        9a:53:ad:5f:3c:e8:28:28:e2:1e:98:05:28:de:82:11:
        2d:a2:aa:d6:16:ed:d8:63:0f:06:5c:70:ab:71:13:00:
        0f:a3:6a:45:c6:6a:af:87:8c:22:e8:03:70:b3:e1:e0:
        2f:62:07:1a:94:14:eb:51:64:58:5b:fc:37:12:8d:90:
        77:eb:1e:b2:da:7e:dc:6e:0a:fd:99:25:68:3b:38:97:
        65:e4:e9:7c:6d:99:ad:64:d1:d4:65:5b:f6:21:47:27:
        00:f4:6e:b3:93:b4:83:06:99:5e:15:5b:de:3b:6a:51:
        53:fc:d1:4c:db:59:61:ee:28:d5:39:01:34:d0:40:71:
        e9:c5:8b:8a:3d:f8:b4:34:00:86:a3:78:d5:b2:1e:71:
        84:96:88:bc:5f:37:28:fb:80:1e:52:f9:90:d8:27:94:
        c2:48:87:ea:2a:64:12:bc:5f:a7:74:36:fa:9b:ae:41
    Fingerprint (SHA-256):
        BE:60:6E:E3:BD:BD:77:19:7F:F6:49:94:71:2F:6C:B9:B3:3B:B8:4E:68:27:2F:35:19:51:74:05:11:1D:50:E0
    Fingerprint (SHA1):
        4E:A0:A9:E7:B4:93:00:68:B9:B3:F9:82:30:AD:03:0C:7E:36:34:66


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4184: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #4185: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185239 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4186: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #4187: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #4188: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185240 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4189: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #4190: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB CAArmyDB
certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd
chains.sh: #4191: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CAArmyReq.der
certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US"  -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CAArmyReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4192: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der  - PASSED
chains.sh: Creating certficate CAArmyArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 519185241   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4193: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army  - PASSED
chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database
certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4194: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database  - PASSED
chains.sh: Creating DB CANavyDB
certutil -N -d CANavyDB -f CANavyDB/dbpasswd
chains.sh: #4195: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CANavyReq.der
certutil -s "CN=CANavy Intermediate, O=CANavy, C=US"  -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CANavyReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4196: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der  - PASSED
chains.sh: Creating certficate CANavyNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 519185242   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4197: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate CANavyNavy.der to CANavyDB database
certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4198: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #4199: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4200: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy
certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 519185243 -7 Bridge@CAArmy  --extCP --extPM < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n
OID.1.1
OID.2.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #4201: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy  - PASSED
chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4202: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeCANavy.der signed by CANavy
certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 519185244 -7 Bridge@CANavy  --extCP --extPM < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n
OID.2.1
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #4203: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy  - PASSED
chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4204: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7
chains.sh: #4205: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4206: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4207: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 519185245   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4208: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4209: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4210: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4211: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 519185246   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4212: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4213: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4214: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4215: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 519185247   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4216: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4217: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #4218: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4219: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 519185248   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4220: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4221: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.0  -t Army.der
vfychain  -pp -vv      -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4222: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.1  -t Army.der
vfychain  -pp -vv      -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185239 (0x1ef22357)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Fri May 19 19:13:45 2017
            Not After : Thu May 19 19:13:45 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:79:31:7e:cc:0e:c3:55:d1:2c:ce:2f:e0:95:8d:2a:
                    e7:3d:6d:b2:8a:e9:fb:ce:fc:cc:cf:d4:c5:17:c0:65:
                    da:e7:16:c1:42:c1:06:00:1a:5c:e4:f9:56:59:67:48:
                    57:7a:25:6e:10:43:eb:84:2e:56:7e:05:f2:32:df:fb:
                    d9:cb:dc:36:f5:b5:9c:c6:39:d4:45:a8:9d:13:9c:c4:
                    f2:c1:77:7b:ab:d1:05:15:c1:0b:3f:de:59:a1:b1:b8:
                    10:dd:27:87:ee:9f:96:77:18:31:6e:35:0d:43:01:28:
                    81:22:c4:02:5e:dc:c6:13:26:0f:d6:d4:3c:d4:5c:61:
                    de:0d:14:9f:ac:89:5a:9f:31:f3:15:6c:17:02:1d:6c:
                    e5:5c:b4:cb:78:fc:6d:71:42:ef:33:8d:02:09:af:97:
                    37:2b:2d:e6:aa:1d:08:4b:23:44:f3:56:49:e5:fe:e2:
                    22:66:e1:3b:73:e7:22:41:f0:b4:ad:a6:ba:7e:ee:4b:
                    c2:a3:ab:5f:d6:f3:27:12:3a:44:f9:82:42:c4:58:12:
                    00:1b:43:b8:3b:8d:83:77:97:30:c7:b5:e6:48:7a:47:
                    4b:3b:e5:46:59:eb:65:97:f9:6e:7b:7a:c8:00:b3:85:
                    da:a6:fb:54:a9:64:69:ac:86:b8:f0:ad:75:b6:52:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        5e:d8:13:02:b3:46:ee:9c:3c:aa:60:e5:5f:78:c3:3c:
        26:d4:2a:0a:05:be:df:8f:0d:31:5b:bd:f0:38:dc:79:
        81:88:b0:e0:7c:38:07:88:97:72:78:dc:f0:74:7c:08:
        18:e3:b8:2e:ba:a5:d4:81:ba:a8:39:87:ce:93:5b:41:
        f6:59:0b:7a:aa:66:b8:67:c0:e9:b9:d9:13:3f:6e:6d:
        24:4b:b9:ec:f9:2e:31:e0:13:f3:49:a0:c6:86:a2:b1:
        74:ff:8b:d5:e8:79:d5:9b:6d:48:30:d7:33:65:d7:e4:
        0e:3a:3f:f7:19:1e:53:fa:59:f3:2f:e4:e5:0d:31:16:
        1e:5a:e5:01:d0:7e:71:76:2d:43:19:d9:ad:6f:98:72:
        dc:17:b1:c9:00:7c:86:35:53:19:3b:67:b7:d3:11:4f:
        75:04:eb:66:6d:2d:41:83:a6:c7:43:ff:d7:15:1a:2b:
        2e:7d:dc:84:e4:4d:0c:a7:22:a7:95:61:71:2a:33:14:
        ea:4b:a8:e3:70:17:f8:45:48:89:59:6c:64:0c:cf:d6:
        33:cf:e4:67:66:fa:9d:36:82:70:3d:7a:bf:ca:4a:f2:
        05:53:ca:88:02:43:75:ef:46:ca:69:6d:27:6d:b9:13:
        c4:e4:52:db:ee:78:0c:79:a6:13:94:3e:5f:15:7b:2a
    Fingerprint (SHA-256):
        8D:27:A7:4F:C1:F6:5B:CF:8B:80:99:6B:A1:56:B0:2C:41:EB:B7:BF:85:2A:D5:C5:9B:86:58:82:AF:B5:A3:93
    Fingerprint (SHA1):
        72:94:94:D6:BA:00:3F:20:76:0A:3B:12:80:98:00:34:E5:68:4C:85


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US"
Returned value is 0, expected result is pass
chains.sh: #4223: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.0  -t Army.der
vfychain  -pp -vv      -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4224: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.1  -t Army.der
vfychain  -pp -vv      -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4225: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.0  -t Navy.der
vfychain  -pp -vv      -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4226: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.1  -t Navy.der
vfychain  -pp -vv      -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4227: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.0  -t Navy.der
vfychain  -pp -vv      -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4228: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.1  -t Navy.der
vfychain  -pp -vv      -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4229: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.0  -t Navy.der
vfychain  -pp -vv      -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4230: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.1  -t Navy.der
vfychain  -pp -vv      -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4231: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.0  -t Navy.der
vfychain  -pp -vv      -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185240 (0x1ef22358)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 19:14:31 2017
            Not After : Thu May 19 19:14:31 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e5:34:bb:f2:8d:d2:28:17:9d:54:76:87:1f:f3:df:b0:
                    44:14:c8:9a:ee:03:3e:73:fd:83:83:73:b7:08:ca:d8:
                    13:fa:e5:bc:6b:21:63:6c:3f:5e:c6:84:fd:18:48:7a:
                    b1:bf:10:c0:49:2a:69:a8:70:8a:09:b0:4a:51:24:e4:
                    1c:0b:f2:fb:bb:66:66:e0:0b:bc:01:cc:07:0f:0c:12:
                    dc:ef:e6:70:de:b4:bd:2a:65:8a:06:38:a3:28:df:8f:
                    82:de:58:ae:12:28:d1:3a:1c:fa:4c:8b:9f:0f:4d:12:
                    d5:bc:66:72:2a:b0:39:66:8b:73:5b:84:95:bb:f7:65:
                    e2:72:f4:76:60:3a:ae:9f:9f:ad:c5:a5:ec:c3:21:77:
                    51:45:71:93:fe:4a:a1:1c:18:3a:5b:aa:9d:f1:08:0b:
                    9d:05:8e:56:96:ba:b4:78:f1:91:0c:17:42:d3:c7:82:
                    cd:f7:ca:17:bb:45:34:f5:cf:47:ea:46:75:23:89:2a:
                    e5:c4:aa:c5:f2:f2:00:77:0c:be:7f:f2:6a:3e:ab:3e:
                    8c:27:08:90:4f:f2:32:95:d2:fc:ef:10:1a:75:c8:d2:
                    6a:e3:8f:8b:0f:b8:e9:49:95:6a:2d:5b:6f:df:49:59:
                    de:5a:2f:35:d6:6f:41:e6:26:96:2d:5b:0b:33:17:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        c2:5b:94:49:a1:cd:50:b0:ee:b8:0e:1f:30:05:43:c1:
        c4:89:1d:a2:4a:5d:aa:43:10:bd:d1:82:f1:95:00:fa:
        f0:ed:c8:84:b3:62:e9:84:09:ea:82:31:27:7d:5f:f0:
        04:fe:6f:d0:6a:36:07:c6:ce:c9:73:d3:f3:20:3a:69:
        4d:b6:28:59:22:d9:1b:22:21:16:33:19:e3:1a:e7:d0:
        27:bf:f7:13:ef:ac:f9:15:7e:bf:5c:17:73:d7:c6:7c:
        fe:e0:cd:58:46:01:d6:ce:bf:df:9c:12:c2:63:f7:77:
        cd:3c:87:c6:31:98:fa:2b:18:41:12:cf:51:b1:fc:a7:
        02:8c:fc:df:ac:df:6f:c9:c8:7a:66:fd:f3:03:78:32:
        42:5f:f3:7f:d6:f5:2c:b7:09:2f:aa:00:bc:fc:65:00:
        47:c8:19:c9:2e:5a:e9:9d:d1:10:52:20:83:be:79:49:
        18:af:39:e2:bd:dc:02:25:e3:ce:9a:de:31:3d:c7:a3:
        e2:38:13:bd:2a:71:ec:0d:64:c5:4a:46:66:e5:44:09:
        28:f3:10:ea:a3:14:68:10:de:78:ad:30:08:54:fc:ee:
        f8:3b:26:86:13:a5:5f:0a:36:c9:6a:99:18:1b:58:24:
        b4:59:d9:8c:1c:7e:b1:30:14:bd:7e:6a:4e:a2:77:41
    Fingerprint (SHA-256):
        08:0E:AF:1F:74:31:82:47:87:27:1C:B8:46:7E:E4:F9:4A:0D:EA:CB:0E:BB:C0:EA:2E:13:7E:70:DF:4A:CB:80
    Fingerprint (SHA1):
        4D:82:F1:27:52:B1:31:F2:6C:12:3D:17:48:D2:5D:2D:34:C2:AE:A3


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US"
Returned value is 0, expected result is pass
chains.sh: #4232: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.1  -t Navy.der
vfychain  -pp -vv      -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4233: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.0  -t Army.der
vfychain  -pp -vv      -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4234: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.1  -t Army.der
vfychain  -pp -vv      -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4235: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.0  -t Army.der
vfychain  -pp -vv      -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4236: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.1  -t Army.der
vfychain  -pp -vv      -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4237: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.1  -t Army.der - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4238: RealCerts: Creating DB AllDB  - PASSED
chains.sh: Importing certificate TestCA.ca.cert to AllDB database
certutil -A -n TestCA.ca  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestCA.ca.cert
chains.sh: #4239: RealCerts: Importing certificate TestCA.ca.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser50.cert to AllDB database
certutil -A -n TestUser50  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestUser50.cert
chains.sh: #4240: RealCerts: Importing certificate TestUser50.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser51.cert to AllDB database
certutil -A -n TestUser51  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestUser51.cert
chains.sh: #4241: RealCerts: Importing certificate TestUser51.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalRootCA.cert to AllDB database
certutil -A -n PayPalRootCA  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/PayPalRootCA.cert
chains.sh: #4242: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalICA.cert to AllDB database
certutil -A -n PayPalICA  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/PayPalICA.cert
chains.sh: #4243: RealCerts: Importing certificate PayPalICA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalEE.cert to AllDB database
certutil -A -n PayPalEE  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/PayPalEE.cert
chains.sh: #4244: RealCerts: Importing certificate PayPalEE.cert to AllDB database  - PASSED
chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database
certutil -A -n BrAirWaysBadSig  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/BrAirWaysBadSig.cert
chains.sh: #4245: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  TestUser50.cert with flags -d AllDB -pp      
vfychain -d AllDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestUser50.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Feb 20 16:25:05 2013
            Not After : Tue Feb 20 16:25:05 2063
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a:
                    02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75:
                    28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c:
                    90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be:
                    92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8:
                    e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2:
                    7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1:
                    cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59:
        d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa:
        b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8:
        8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2:
        b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb:
        be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9:
        4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd:
        37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65
    Fingerprint (SHA-256):
        E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65
    Fingerprint (SHA1):
        1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #4246: RealCerts: Verifying certificate(s)  TestUser50.cert with flags -d AllDB -pp       - PASSED
chains.sh: Verifying certificate(s)  TestUser51.cert with flags -d AllDB -pp      
vfychain -d AllDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestUser51.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Feb 20 16:25:05 2013
            Not After : Tue Feb 20 16:25:05 2063
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a:
                    02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75:
                    28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c:
                    90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be:
                    92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8:
                    e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2:
                    7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1:
                    cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59:
        d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa:
        b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8:
        8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2:
        b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb:
        be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9:
        4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd:
        37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65
    Fingerprint (SHA-256):
        E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65
    Fingerprint (SHA1):
        1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #4247: RealCerts: Verifying certificate(s)  TestUser51.cert with flags -d AllDB -pp       - PASSED
chains.sh: Verifying certificate(s)  PayPalEE.cert with flags -d AllDB -pp      -o OID.2.16.840.1.113733.1.7.23.6 
vfychain -d AllDB -pp -vv      -o OID.2.16.840.1.113733.1.7.23.6  /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/PayPalEE.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            18:da:d1:9e:26:7d:e8:bb:4a:21:58:cd:cc:6b:3b:4a
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=VeriSign Class 3 Public Primary Certification Authority -
             G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ver
            iSign Trust Network,O="VeriSign, Inc.",C=US"
        Validity:
            Not Before: Wed Nov 08 00:00:00 2006
            Not After : Wed Jul 16 23:59:59 2036
        Subject: "CN=VeriSign Class 3 Public Primary Certification Authority 
            - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve
            riSign Trust Network,O="VeriSign, Inc.",C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc:
                    7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64:
                    85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42:
                    b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec:
                    ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3:
                    62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b:
                    9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f:
                    e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db:
                    7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af:
                    1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a:
                    b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7:
                    ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74:
                    24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4:
                    8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95:
                    ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f:
                    73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Critical: True
            Usages: Certificate Signing
                    CRL Signing

            Name: OID.1.3.6.1.5.5.7.1.12
            Data: Sequence {
                [1]: {
                    [0]: {
                        Sequence {
                            Sequence {
                                Sequence {
                                    "image/gif"
                                    Sequence {
                                        Sequence {
                                            Sequence {
                                                SHA-1
                                            }
                                            8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf:
                                            80:6a:d4:48:18:2c:7b:19:2e
                                        }
                                    }
                                    Sequence {
                                        "http://logo.verisign.com/vslogo.gif"
                                    }
                                }
                            }
                        }
                    }
                }
            }

            Name: Certificate Subject Key ID
            Data:
                7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02:
                af:33:31:33

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        93:24:4a:30:5f:62:cf:d8:1a:98:2f:3d:ea:dc:99:2d:
        bd:77:f6:a5:79:22:38:ec:c4:a7:a0:78:12:ad:62:0e:
        45:70:64:c5:e7:97:66:2d:98:09:7e:5f:af:d6:cc:28:
        65:f2:01:aa:08:1a:47:de:f9:f9:7c:92:5a:08:69:20:
        0d:d9:3e:6d:6e:3c:0d:6e:d8:e6:06:91:40:18:b9:f8:
        c1:ed:df:db:41:aa:e0:96:20:c9:cd:64:15:38:81:c9:
        94:ee:a2:84:29:0b:13:6f:8e:db:0c:dd:25:02:db:a4:
        8b:19:44:d2:41:7a:05:69:4a:58:4f:60:ca:7e:82:6a:
        0b:02:aa:25:17:39:b5:db:7f:e7:84:65:2a:95:8a:bd:
        86:de:5e:81:16:83:2d:10:cc:de:fd:a8:82:2a:6d:28:
        1f:0d:0b:c4:e5:e7:1a:26:19:e1:f4:11:6f:10:b5:95:
        fc:e7:42:05:32:db:ce:9d:51:5e:28:b6:9e:85:d3:5b:
        ef:a5:7d:45:40:72:8e:b7:0e:6b:0e:06:fb:33:35:48:
        71:b8:9d:27:8b:c4:65:5f:0d:86:76:9c:44:7a:f6:95:
        5c:f6:5d:32:08:33:a4:54:b6:18:3f:68:5c:f2:42:4a:
        85:38:54:83:5f:d1:e8:2c:f2:ac:11:d6:a8:ed:63:6a
    Fingerprint (SHA-256):
        9A:CF:AB:7E:43:C8:D8:80:D0:6B:26:2A:94:DE:EE:E4:B4:65:99:89:C3:D0:CA:F1:9B:AF:64:05:E4:1A:B7:DF
    Fingerprint (SHA1):
        4E:B6:D5:78:49:9B:1C:CF:5F:58:1E:AD:56:BE:3D:9B:67:44:A5:E5

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",STR
    EET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C=US,ser
    ialNumber=3014267,businessCategory=Private Organization,incorporationStat
    e=Delaware,incorporationCountry=US"
Certificate 2 Subject: "CN=Symantec Class 3 EV SSL CA - G3,OU=Symantec Trust 
    Network,O=Symantec Corporation,C=US"
Returned value is 0, expected result is pass
chains.sh: #4248: RealCerts: Verifying certificate(s)  PayPalEE.cert with flags -d AllDB -pp      -o OID.2.16.840.1.113733.1.7.23.6  - PASSED
chains.sh: Verifying certificate(s)  BrAirWaysBadSig.cert with flags -d AllDB -pp      
vfychain -d AllDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/BrAirWaysBadSig.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. BrAirWaysBadSig :
  ERROR -8181: Peer's Certificate has expired.
Returned value is 1, expected result is fail
chains.sh: #4249: RealCerts: Verifying certificate(s)  BrAirWaysBadSig.cert with flags -d AllDB -pp       - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4250: DSA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185249 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4251: DSA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4252: DSA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4253: DSA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4254: DSA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 519185250   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4255: DSA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4256: DSA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4257: DSA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4258: DSA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 519185251   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4259: DSA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4260: DSA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4261: DSA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4262: DSA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 519185252   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4263: DSA: Creating certficate CA2Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA2Root.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4264: DSA: Importing certificate CA2Root.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #4265: DSA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4266: DSA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 519185253   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4267: DSA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4268: DSA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #4269: DSA: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4270: DSA: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 519185254   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4271: DSA: Creating certficate CA3Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA3Root.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4272: DSA: Importing certificate CA3Root.der to CA3DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #4273: DSA: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R  -d EE3DB -f EE3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4274: DSA: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 519185255   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4275: DSA: Creating certficate EE3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate EE3CA3.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4276: DSA: Importing certificate EE3CA3.der to EE3DB database  - PASSED
chains.sh: Creating DB CA4DB
certutil -N -d CA4DB -f CA4DB/dbpasswd
chains.sh: #4277: DSA: Creating DB CA4DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA4Req.der
certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA4Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4278: DSA: Creating Intermediate certifiate request CA4Req.der  - PASSED
chains.sh: Creating certficate CA4Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 519185256   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4279: DSA: Creating certficate CA4Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA4Root.der to CA4DB database
certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4280: DSA: Importing certificate CA4Root.der to CA4DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #4281: DSA: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R  -d EE4DB -f EE4DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE4Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4282: DSA: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA4.der signed by CA4
certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 519185257   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4283: DSA: Creating certficate EE4CA4.der signed by CA4  - PASSED
chains.sh: Importing certificate EE4CA4.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4284: DSA: Importing certificate EE4CA4.der to EE4DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4285: DSA: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags -d AllDB -pp       -t Root.der
vfychain -d AllDB -pp -vv       EE1CA1.der CA1Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185249 (0x1ef22361)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:15:59 2017
            Not After : Thu May 19 19:15:59 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa:
                    65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba:
                    66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7:
                    2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec:
                    c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52:
                    13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d:
                    c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74:
                    be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f:
                    3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3:
                    6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb:
                    47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61:
                    db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5:
                    7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c:
                    20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa:
                    93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32:
                    60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a:
                    42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6:
                    51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6:
                    c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d:
                    b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64:
                    b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e:
                    0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59:
                    29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b:
                    47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3:
                    1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0:
                    c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48:
                    ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92:
                    90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b:
                    56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd:
                    ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe:
                    d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba:
                    77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba:
                    0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12:
                    cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32:
                    f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
            DSA Public Key:
                Prime:
                    c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd:
                    bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08:
                    b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b:
                    a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83:
                    02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9:
                    2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8:
                    f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63:
                    76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef:
                    30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3:
                    f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f:
                    2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97:
                    ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81:
                    16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c:
                    98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9:
                    34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32:
                    aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9
                Subprime:
                    e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:
                    1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1
                Base:
                    70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:
                    ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:
                    1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:
                    92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:
                    7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:
                    3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:
                    ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:
                    1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:
                    f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:
                    89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac:
                    ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:
                    85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:
                    c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:
                    be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:
                    cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:
                    57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
                PublicValue:
                    4e:d9:8e:a6:71:ef:94:be:73:fc:29:ce:4c:a5:6b:33:
                    85:1c:20:7c:4f:ed:c9:c6:a2:e3:7b:45:44:c9:d8:74:
                    13:96:e8:4d:27:68:a5:a7:64:8f:32:6e:47:ef:87:e0:
                    dd:78:52:00:5f:5d:15:ea:29:c5:ed:eb:d3:63:de:5b:
                    9e:21:db:f8:6b:2f:37:bb:00:56:99:9c:91:e7:46:43:
                    4a:15:d2:e4:bd:40:61:b5:e7:c9:9a:94:b8:fe:ed:a9:
                    f4:98:8a:5e:eb:78:fd:37:e3:6d:2f:1d:b0:17:dc:f6:
                    4d:05:13:39:dc:ed:8f:25:c9:6e:f0:11:b8:ec:ec:d4:
                    a1:bb:70:4e:fd:72:87:fa:e1:24:aa:45:02:97:4a:52:
                    be:92:e0:d2:30:38:4b:32:32:8e:bd:d8:97:04:1c:89:
                    27:ad:77:61:4d:32:5c:bc:4d:4c:62:ab:07:b5:25:08:
                    ea:43:b8:69:48:04:70:8d:d9:50:38:71:ec:81:60:8f:
                    ab:fa:1e:5c:b4:b1:95:10:1a:6d:be:94:5c:95:0b:0e:
                    da:23:7d:3c:63:d8:f0:9a:fb:54:cf:b5:1c:72:7c:ce:
                    45:b4:16:7c:f6:51:99:b5:f6:97:f1:c7:32:ca:7f:de:
                    07:83:d1:7f:86:78:a7:d8:6a:0e:7e:2c:55:cd:47:d0
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:3d:02:1d:00:b9:67:e5:5f:1e:19:08:05:6c:82:99:
        e3:dd:f5:e9:4e:4a:b4:93:2c:61:0c:04:a1:59:83:12:
        0b:02:1c:08:cd:58:80:09:39:0e:91:00:a0:77:2d:f3:
        52:2b:b2:94:c5:76:86:46:ad:7d:e0:bd:aa:13:b8
    Fingerprint (SHA-256):
        1D:5A:CF:BA:16:63:C1:87:D4:C1:94:A3:4E:8E:C0:D3:31:7E:E5:4F:63:A2:EB:08:59:75:9B:DF:F0:41:5E:17
    Fingerprint (SHA1):
        0B:F8:ED:EA:8B:10:78:07:D5:17:3D:44:F8:3F:D7:CF:28:6E:73:90


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4286: DSA: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags -d AllDB -pp       -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags -d AllDB -pp       -t Root.der
vfychain -d AllDB -pp -vv       EE2CA2.der CA2Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185249 (0x1ef22361)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:15:59 2017
            Not After : Thu May 19 19:15:59 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa:
                    65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba:
                    66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7:
                    2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec:
                    c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52:
                    13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d:
                    c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74:
                    be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f:
                    3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3:
                    6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb:
                    47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61:
                    db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5:
                    7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c:
                    20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa:
                    93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32:
                    60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a:
                    42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6:
                    51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6:
                    c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d:
                    b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64:
                    b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e:
                    0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59:
                    29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b:
                    47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3:
                    1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0:
                    c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48:
                    ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92:
                    90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b:
                    56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd:
                    ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe:
                    d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba:
                    77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba:
                    0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12:
                    cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32:
                    f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
            DSA Public Key:
                Prime:
                    c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd:
                    bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08:
                    b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b:
                    a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83:
                    02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9:
                    2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8:
                    f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63:
                    76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef:
                    30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3:
                    f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f:
                    2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97:
                    ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81:
                    16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c:
                    98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9:
                    34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32:
                    aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9
                Subprime:
                    e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:
                    1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1
                Base:
                    70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:
                    ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:
                    1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:
                    92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:
                    7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:
                    3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:
                    ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:
                    1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:
                    f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:
                    89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac:
                    ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:
                    85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:
                    c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:
                    be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:
                    cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:
                    57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
                PublicValue:
                    4e:d9:8e:a6:71:ef:94:be:73:fc:29:ce:4c:a5:6b:33:
                    85:1c:20:7c:4f:ed:c9:c6:a2:e3:7b:45:44:c9:d8:74:
                    13:96:e8:4d:27:68:a5:a7:64:8f:32:6e:47:ef:87:e0:
                    dd:78:52:00:5f:5d:15:ea:29:c5:ed:eb:d3:63:de:5b:
                    9e:21:db:f8:6b:2f:37:bb:00:56:99:9c:91:e7:46:43:
                    4a:15:d2:e4:bd:40:61:b5:e7:c9:9a:94:b8:fe:ed:a9:
                    f4:98:8a:5e:eb:78:fd:37:e3:6d:2f:1d:b0:17:dc:f6:
                    4d:05:13:39:dc:ed:8f:25:c9:6e:f0:11:b8:ec:ec:d4:
                    a1:bb:70:4e:fd:72:87:fa:e1:24:aa:45:02:97:4a:52:
                    be:92:e0:d2:30:38:4b:32:32:8e:bd:d8:97:04:1c:89:
                    27:ad:77:61:4d:32:5c:bc:4d:4c:62:ab:07:b5:25:08:
                    ea:43:b8:69:48:04:70:8d:d9:50:38:71:ec:81:60:8f:
                    ab:fa:1e:5c:b4:b1:95:10:1a:6d:be:94:5c:95:0b:0e:
                    da:23:7d:3c:63:d8:f0:9a:fb:54:cf:b5:1c:72:7c:ce:
                    45:b4:16:7c:f6:51:99:b5:f6:97:f1:c7:32:ca:7f:de:
                    07:83:d1:7f:86:78:a7:d8:6a:0e:7e:2c:55:cd:47:d0
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:3d:02:1d:00:b9:67:e5:5f:1e:19:08:05:6c:82:99:
        e3:dd:f5:e9:4e:4a:b4:93:2c:61:0c:04:a1:59:83:12:
        0b:02:1c:08:cd:58:80:09:39:0e:91:00:a0:77:2d:f3:
        52:2b:b2:94:c5:76:86:46:ad:7d:e0:bd:aa:13:b8
    Fingerprint (SHA-256):
        1D:5A:CF:BA:16:63:C1:87:D4:C1:94:A3:4E:8E:C0:D3:31:7E:E5:4F:63:A2:EB:08:59:75:9B:DF:F0:41:5E:17
    Fingerprint (SHA1):
        0B:F8:ED:EA:8B:10:78:07:D5:17:3D:44:F8:3F:D7:CF:28:6E:73:90


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4287: DSA: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags -d AllDB -pp       -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags -d AllDB -pp       -t Root.der
vfychain -d AllDB -pp -vv       EE3CA3.der CA3Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185249 (0x1ef22361)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:15:59 2017
            Not After : Thu May 19 19:15:59 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa:
                    65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba:
                    66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7:
                    2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec:
                    c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52:
                    13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d:
                    c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74:
                    be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f:
                    3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3:
                    6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb:
                    47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61:
                    db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5:
                    7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c:
                    20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa:
                    93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32:
                    60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a:
                    42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6:
                    51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6:
                    c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d:
                    b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64:
                    b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e:
                    0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59:
                    29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b:
                    47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3:
                    1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0:
                    c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48:
                    ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92:
                    90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b:
                    56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd:
                    ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe:
                    d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba:
                    77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba:
                    0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12:
                    cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32:
                    f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
            DSA Public Key:
                Prime:
                    c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd:
                    bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08:
                    b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b:
                    a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83:
                    02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9:
                    2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8:
                    f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63:
                    76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef:
                    30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3:
                    f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f:
                    2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97:
                    ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81:
                    16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c:
                    98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9:
                    34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32:
                    aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9
                Subprime:
                    e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:
                    1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1
                Base:
                    70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:
                    ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:
                    1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:
                    92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:
                    7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:
                    3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:
                    ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:
                    1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:
                    f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:
                    89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac:
                    ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:
                    85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:
                    c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:
                    be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:
                    cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:
                    57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
                PublicValue:
                    4e:d9:8e:a6:71:ef:94:be:73:fc:29:ce:4c:a5:6b:33:
                    85:1c:20:7c:4f:ed:c9:c6:a2:e3:7b:45:44:c9:d8:74:
                    13:96:e8:4d:27:68:a5:a7:64:8f:32:6e:47:ef:87:e0:
                    dd:78:52:00:5f:5d:15:ea:29:c5:ed:eb:d3:63:de:5b:
                    9e:21:db:f8:6b:2f:37:bb:00:56:99:9c:91:e7:46:43:
                    4a:15:d2:e4:bd:40:61:b5:e7:c9:9a:94:b8:fe:ed:a9:
                    f4:98:8a:5e:eb:78:fd:37:e3:6d:2f:1d:b0:17:dc:f6:
                    4d:05:13:39:dc:ed:8f:25:c9:6e:f0:11:b8:ec:ec:d4:
                    a1:bb:70:4e:fd:72:87:fa:e1:24:aa:45:02:97:4a:52:
                    be:92:e0:d2:30:38:4b:32:32:8e:bd:d8:97:04:1c:89:
                    27:ad:77:61:4d:32:5c:bc:4d:4c:62:ab:07:b5:25:08:
                    ea:43:b8:69:48:04:70:8d:d9:50:38:71:ec:81:60:8f:
                    ab:fa:1e:5c:b4:b1:95:10:1a:6d:be:94:5c:95:0b:0e:
                    da:23:7d:3c:63:d8:f0:9a:fb:54:cf:b5:1c:72:7c:ce:
                    45:b4:16:7c:f6:51:99:b5:f6:97:f1:c7:32:ca:7f:de:
                    07:83:d1:7f:86:78:a7:d8:6a:0e:7e:2c:55:cd:47:d0
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:3d:02:1d:00:b9:67:e5:5f:1e:19:08:05:6c:82:99:
        e3:dd:f5:e9:4e:4a:b4:93:2c:61:0c:04:a1:59:83:12:
        0b:02:1c:08:cd:58:80:09:39:0e:91:00:a0:77:2d:f3:
        52:2b:b2:94:c5:76:86:46:ad:7d:e0:bd:aa:13:b8
    Fingerprint (SHA-256):
        1D:5A:CF:BA:16:63:C1:87:D4:C1:94:A3:4E:8E:C0:D3:31:7E:E5:4F:63:A2:EB:08:59:75:9B:DF:F0:41:5E:17
    Fingerprint (SHA1):
        0B:F8:ED:EA:8B:10:78:07:D5:17:3D:44:F8:3F:D7:CF:28:6E:73:90


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #4288: DSA: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags -d AllDB -pp       -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags -d AllDB -pp       -t Root.der
vfychain -d AllDB -pp -vv       EE4CA4.der CA4Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185249 (0x1ef22361)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:15:59 2017
            Not After : Thu May 19 19:15:59 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa:
                    65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba:
                    66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7:
                    2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec:
                    c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52:
                    13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d:
                    c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74:
                    be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f:
                    3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3:
                    6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb:
                    47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61:
                    db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5:
                    7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c:
                    20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa:
                    93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32:
                    60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a:
                    42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6:
                    51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6:
                    c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d:
                    b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64:
                    b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e:
                    0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59:
                    29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b:
                    47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3:
                    1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0:
                    c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48:
                    ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92:
                    90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b:
                    56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd:
                    ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe:
                    d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba:
                    77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba:
                    0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12:
                    cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32:
                    f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
            DSA Public Key:
                Prime:
                    c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd:
                    bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08:
                    b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b:
                    a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83:
                    02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9:
                    2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8:
                    f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63:
                    76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef:
                    30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3:
                    f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f:
                    2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97:
                    ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81:
                    16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c:
                    98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9:
                    34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32:
                    aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9
                Subprime:
                    e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:
                    1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1
                Base:
                    70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:
                    ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:
                    1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:
                    92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:
                    7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:
                    3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:
                    ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:
                    1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:
                    f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:
                    89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac:
                    ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:
                    85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:
                    c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:
                    be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:
                    cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:
                    57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
                PublicValue:
                    4e:d9:8e:a6:71:ef:94:be:73:fc:29:ce:4c:a5:6b:33:
                    85:1c:20:7c:4f:ed:c9:c6:a2:e3:7b:45:44:c9:d8:74:
                    13:96:e8:4d:27:68:a5:a7:64:8f:32:6e:47:ef:87:e0:
                    dd:78:52:00:5f:5d:15:ea:29:c5:ed:eb:d3:63:de:5b:
                    9e:21:db:f8:6b:2f:37:bb:00:56:99:9c:91:e7:46:43:
                    4a:15:d2:e4:bd:40:61:b5:e7:c9:9a:94:b8:fe:ed:a9:
                    f4:98:8a:5e:eb:78:fd:37:e3:6d:2f:1d:b0:17:dc:f6:
                    4d:05:13:39:dc:ed:8f:25:c9:6e:f0:11:b8:ec:ec:d4:
                    a1:bb:70:4e:fd:72:87:fa:e1:24:aa:45:02:97:4a:52:
                    be:92:e0:d2:30:38:4b:32:32:8e:bd:d8:97:04:1c:89:
                    27:ad:77:61:4d:32:5c:bc:4d:4c:62:ab:07:b5:25:08:
                    ea:43:b8:69:48:04:70:8d:d9:50:38:71:ec:81:60:8f:
                    ab:fa:1e:5c:b4:b1:95:10:1a:6d:be:94:5c:95:0b:0e:
                    da:23:7d:3c:63:d8:f0:9a:fb:54:cf:b5:1c:72:7c:ce:
                    45:b4:16:7c:f6:51:99:b5:f6:97:f1:c7:32:ca:7f:de:
                    07:83:d1:7f:86:78:a7:d8:6a:0e:7e:2c:55:cd:47:d0
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:3d:02:1d:00:b9:67:e5:5f:1e:19:08:05:6c:82:99:
        e3:dd:f5:e9:4e:4a:b4:93:2c:61:0c:04:a1:59:83:12:
        0b:02:1c:08:cd:58:80:09:39:0e:91:00:a0:77:2d:f3:
        52:2b:b2:94:c5:76:86:46:ad:7d:e0:bd:aa:13:b8
    Fingerprint (SHA-256):
        1D:5A:CF:BA:16:63:C1:87:D4:C1:94:A3:4E:8E:C0:D3:31:7E:E5:4F:63:A2:EB:08:59:75:9B:DF:F0:41:5E:17
    Fingerprint (SHA1):
        0B:F8:ED:EA:8B:10:78:07:D5:17:3D:44:F8:3F:D7:CF:28:6E:73:90


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US"
Returned value is 0, expected result is pass
chains.sh: #4289: DSA: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags -d AllDB -pp       -t Root.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4290: Revocation: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 10 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4291: Revocation: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4292: Revocation: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #4293: Revocation: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA0Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4294: Revocation: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4295: Revocation: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4296: Revocation: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4297: Revocation: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4298: Revocation: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4299: Revocation: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4300: Revocation: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #4301: Revocation: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE11Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4302: Revocation: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4303: Revocation: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4304: Revocation: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB EE12DB
certutil -N -d EE12DB -f EE12DB/dbpasswd
chains.sh: #4305: Revocation: Creating DB EE12DB  - PASSED
chains.sh: Creating EE certifiate request EE12Req.der
certutil -s "CN=EE12 EE, O=EE12, C=US"  -R  -d EE12DB -f EE12DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE12Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4306: Revocation: Creating EE certifiate request EE12Req.der  - PASSED
chains.sh: Creating certficate EE12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4307: Revocation: Creating certficate EE12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE12CA1.der to EE12DB database
certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4308: Revocation: Importing certificate EE12CA1.der to EE12DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4309: Revocation: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4310: Revocation: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4311: Revocation: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4312: Revocation: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #4313: Revocation: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE21Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4314: Revocation: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4315: Revocation: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4316: Revocation: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20170519191757Z
nextupdate=20180519191757Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Fri May 19 19:17:57 2017
    Next Update: Sat May 19 19:17:57 2018
    CRL Extensions:
chains.sh: #4317: Revocation: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20170519191757Z
nextupdate=20180519191757Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Fri May 19 19:17:57 2017
    Next Update: Sat May 19 19:17:57 2018
    CRL Extensions:
chains.sh: #4318: Revocation: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20170519191757Z
nextupdate=20180519191757Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Fri May 19 19:17:57 2017
    Next Update: Sat May 19 19:17:57 2018
    CRL Extensions:
chains.sh: #4319: Revocation: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20170519191758Z
nextupdate=20180519191758Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Fri May 19 19:17:58 2017
    Next Update: Sat May 19 19:17:58 2018
    CRL Extensions:
chains.sh: #4320: Revocation: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 14 issued by CA1
crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20170519191759Z
addcert 14 20170519191759Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Fri May 19 19:17:59 2017
    Next Update: Sat May 19 19:17:57 2018
    Entry 1 (0x1):
        Serial Number: 14 (0xe)
        Revocation Date: Fri May 19 19:17:59 2017
    CRL Extensions:
chains.sh: #4321: Revocation: Revoking certificate with SN 14 issued by CA1  - PASSED
chains.sh: Revoking certificate with SN 15 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20170519191800Z
addcert 15 20170519191800Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Fri May 19 19:18:00 2017
    Next Update: Sat May 19 19:17:57 2018
    Entry 1 (0x1):
        Serial Number: 15 (0xf)
        Revocation Date: Fri May 19 19:18:00 2017
    CRL Extensions:
chains.sh: #4322: Revocation: Revoking certificate with SN 15 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4323: Revocation: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4324: Revocation: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #4325: Revocation: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA0Root.der to AllDB database
certutil -A -n CA0  -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der
chains.sh: #4326: Revocation: Importing certificate CA0Root.der to AllDB database  - PASSED
chains.sh: Importing CRL CA0.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl
chains.sh: #4327: Revocation: Importing CRL CA0.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA1CA0.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der
chains.sh: #4328: Revocation: Importing certificate CA1CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA1.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl
chains.sh: #4329: Revocation: Importing CRL CA1.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA0.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der
chains.sh: #4330: Revocation: Importing certificate CA2CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA2.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl
chains.sh: #4331: Revocation: Importing CRL CA2.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags -d AllDB -pp   -g leaf -m crl     -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:16:50 2017
            Not After : Thu May 19 19:16:50 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:1a:a3:c9:5d:c1:c8:61:e8:8d:79:14:ed:84:04:3a:
                    3c:d7:87:77:8a:24:42:af:a9:e8:27:b6:92:2c:df:10:
                    71:79:94:4f:05:2d:c0:03:c7:03:ca:4c:16:53:18:74:
                    46:f6:2f:b9:ff:05:cf:a9:7d:68:30:41:74:bc:62:ff:
                    50:1f:b6:8a:b8:90:50:fd:1c:ff:6b:ae:ce:df:32:b1:
                    a8:af:76:11:c2:5f:e8:d0:54:64:6d:6e:46:df:90:0a:
                    8e:df:83:65:f6:73:ef:5c:b4:78:34:a2:ec:60:c5:76:
                    7b:3b:b3:d1:69:cc:48:c7:e7:9d:37:da:af:56:2c:fc:
                    02:6b:87:f6:f2:cf:85:3d:9c:3d:c7:a3:48:a0:68:4c:
                    7b:ee:07:07:dc:44:5d:3a:4e:28:a6:2f:d7:24:85:10:
                    09:84:ae:bf:c1:e2:5b:bc:68:33:c0:50:55:b1:d2:d5:
                    f7:59:a4:10:d1:12:6e:b0:12:fc:71:6f:e3:0e:39:c5:
                    55:d6:bb:b0:69:06:f9:a5:f2:60:ca:5e:b4:c7:42:c3:
                    51:68:e1:74:63:39:6e:9b:8c:8d:81:ab:71:bf:de:d1:
                    57:dc:3e:7f:d8:13:ef:42:d6:bd:49:0b:24:ab:52:78:
                    13:05:b8:33:fd:f5:4e:27:c8:da:63:dc:6a:84:14:4d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        8e:86:d0:84:15:a0:cc:ca:f6:65:83:8e:87:c1:d0:91:
        e6:c4:4b:6a:96:e2:70:a5:45:35:f3:ff:88:df:fe:bc:
        e4:34:00:8f:d9:cc:8c:78:4d:62:c1:6a:c2:a4:10:cd:
        90:a0:2f:08:ad:80:69:be:24:e4:91:ce:16:59:d0:aa:
        9c:47:b3:82:7b:46:2b:4b:23:0e:f3:c3:47:f4:e1:e2:
        bf:db:87:a6:10:ba:08:17:91:19:24:f5:2e:e6:84:08:
        63:ce:7d:8f:55:a1:fd:c9:9a:8a:91:74:96:22:3b:c6:
        2e:20:c8:f0:92:33:1a:a5:66:86:1b:a2:26:16:77:61:
        d7:68:3a:90:80:90:82:b1:ea:92:9d:c6:59:7f:8d:87:
        5f:8f:6a:8d:59:62:bf:3a:f1:a1:2a:e9:2e:43:29:f1:
        90:ae:02:4d:26:2c:35:79:43:c2:51:28:a9:41:c4:84:
        d4:ad:ed:8b:f6:da:3d:ab:4f:ca:04:af:6e:3b:52:90:
        e9:eb:5b:be:69:ee:13:af:d1:44:07:a9:22:1d:76:24:
        47:27:ed:10:88:37:42:8f:93:98:9a:4b:93:8e:36:ab:
        86:35:d5:68:ae:e2:c2:23:92:bf:01:e6:0a:4f:0c:a4:
        8f:7a:cb:db:57:f8:0d:f7:13:a7:76:0a:99:08:19:d5
    Fingerprint (SHA-256):
        FC:26:B7:AC:D4:BC:DB:81:3D:2E:74:2E:25:89:F3:BF:91:2B:C0:9B:5B:1A:8C:46:DD:06:E9:A4:89:F3:CF:02
    Fingerprint (SHA1):
        EC:80:43:75:34:53:B6:B5:10:C7:F1:31:37:46:21:DC:04:D6:E3:B0

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #4332: Revocation: Verifying certificate(s)  EE11CA1.der with flags -d AllDB -pp   -g leaf -m crl     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE12CA1.der with flags -d AllDB -pp   -g leaf -m crl     -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -m crl     EE12CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4333: Revocation: Verifying certificate(s)  EE12CA1.der with flags -d AllDB -pp   -g leaf -m crl     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags -d AllDB -pp   -g chain -m crl     -t Root.der
vfychain -d AllDB -pp -vv   -g chain -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:16:50 2017
            Not After : Thu May 19 19:16:50 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:1a:a3:c9:5d:c1:c8:61:e8:8d:79:14:ed:84:04:3a:
                    3c:d7:87:77:8a:24:42:af:a9:e8:27:b6:92:2c:df:10:
                    71:79:94:4f:05:2d:c0:03:c7:03:ca:4c:16:53:18:74:
                    46:f6:2f:b9:ff:05:cf:a9:7d:68:30:41:74:bc:62:ff:
                    50:1f:b6:8a:b8:90:50:fd:1c:ff:6b:ae:ce:df:32:b1:
                    a8:af:76:11:c2:5f:e8:d0:54:64:6d:6e:46:df:90:0a:
                    8e:df:83:65:f6:73:ef:5c:b4:78:34:a2:ec:60:c5:76:
                    7b:3b:b3:d1:69:cc:48:c7:e7:9d:37:da:af:56:2c:fc:
                    02:6b:87:f6:f2:cf:85:3d:9c:3d:c7:a3:48:a0:68:4c:
                    7b:ee:07:07:dc:44:5d:3a:4e:28:a6:2f:d7:24:85:10:
                    09:84:ae:bf:c1:e2:5b:bc:68:33:c0:50:55:b1:d2:d5:
                    f7:59:a4:10:d1:12:6e:b0:12:fc:71:6f:e3:0e:39:c5:
                    55:d6:bb:b0:69:06:f9:a5:f2:60:ca:5e:b4:c7:42:c3:
                    51:68:e1:74:63:39:6e:9b:8c:8d:81:ab:71:bf:de:d1:
                    57:dc:3e:7f:d8:13:ef:42:d6:bd:49:0b:24:ab:52:78:
                    13:05:b8:33:fd:f5:4e:27:c8:da:63:dc:6a:84:14:4d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        8e:86:d0:84:15:a0:cc:ca:f6:65:83:8e:87:c1:d0:91:
        e6:c4:4b:6a:96:e2:70:a5:45:35:f3:ff:88:df:fe:bc:
        e4:34:00:8f:d9:cc:8c:78:4d:62:c1:6a:c2:a4:10:cd:
        90:a0:2f:08:ad:80:69:be:24:e4:91:ce:16:59:d0:aa:
        9c:47:b3:82:7b:46:2b:4b:23:0e:f3:c3:47:f4:e1:e2:
        bf:db:87:a6:10:ba:08:17:91:19:24:f5:2e:e6:84:08:
        63:ce:7d:8f:55:a1:fd:c9:9a:8a:91:74:96:22:3b:c6:
        2e:20:c8:f0:92:33:1a:a5:66:86:1b:a2:26:16:77:61:
        d7:68:3a:90:80:90:82:b1:ea:92:9d:c6:59:7f:8d:87:
        5f:8f:6a:8d:59:62:bf:3a:f1:a1:2a:e9:2e:43:29:f1:
        90:ae:02:4d:26:2c:35:79:43:c2:51:28:a9:41:c4:84:
        d4:ad:ed:8b:f6:da:3d:ab:4f:ca:04:af:6e:3b:52:90:
        e9:eb:5b:be:69:ee:13:af:d1:44:07:a9:22:1d:76:24:
        47:27:ed:10:88:37:42:8f:93:98:9a:4b:93:8e:36:ab:
        86:35:d5:68:ae:e2:c2:23:92:bf:01:e6:0a:4f:0c:a4:
        8f:7a:cb:db:57:f8:0d:f7:13:a7:76:0a:99:08:19:d5
    Fingerprint (SHA-256):
        FC:26:B7:AC:D4:BC:DB:81:3D:2E:74:2E:25:89:F3:BF:91:2B:C0:9B:5B:1A:8C:46:DD:06:E9:A4:89:F3:CF:02
    Fingerprint (SHA1):
        EC:80:43:75:34:53:B6:B5:10:C7:F1:31:37:46:21:DC:04:D6:E3:B0

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #4334: Revocation: Verifying certificate(s)  EE11CA1.der with flags -d AllDB -pp   -g chain -m crl     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der with flags -d AllDB -pp   -g chain -m crl     -t Root.der
vfychain -d AllDB -pp -vv   -g chain -m crl     EE21CA2.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4335: Revocation: Verifying certificate(s)  EE21CA2.der with flags -d AllDB -pp   -g chain -m crl     -t Root.der - PASSED
tstclnt -h 127.0.0.1 -p 8641 -q -t 20
chains.sh: #4336: Test that OCSP server is reachable - PASSED
chains.sh: Creating DB OCSPRootDB
certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd
chains.sh: #4337: OCSP: Creating DB OCSPRootDB  - PASSED
chains.sh: Importing certificate OCSPRoot.der to OCSPRootDB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i ../OCSPD/OCSPRoot.der
chains.sh: #4338: OCSP: Importing certificate OCSPRoot.der to OCSPRootDB database  - PASSED
chains.sh: Creating DB OCSPCA1DB
certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd
chains.sh: #4339: OCSP: Creating DB OCSPCA1DB  - PASSED
chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d OCSPCA1DB -i ../OCSPD/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #4340: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database  - PASSED
chains.sh: Create CRL for OCSPCA1DB
crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20170519191804Z
nextupdate=20180519191804Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Fri May 19 19:18:04 2017
    Next Update: Sat May 19 19:18:04 2018
    CRL Extensions:
chains.sh: #4341: OCSP: Create CRL for OCSPCA1DB  - PASSED
chains.sh: Revoking certificate with SN 3 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20170519191806Z
addcert 3 20170519191806Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Fri May 19 19:18:06 2017
    Next Update: Sat May 19 19:18:04 2018
    Entry 1 (0x1):
        Serial Number: 3 (0x3)
        Revocation Date: Fri May 19 19:18:06 2017
    CRL Extensions:
chains.sh: #4342: OCSP: Revoking certificate with SN 3 issued by OCSPCA1  - PASSED
chains.sh: Revoking certificate with SN 4 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20170519191807Z
addcert 4 20170519191807Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Fri May 19 19:18:07 2017
    Next Update: Sat May 19 19:18:04 2018
    Entry 1 (0x1):
        Serial Number: 4 (0x4)
        Revocation Date: Fri May 19 19:18:07 2017
    Entry 2 (0x2):
        Serial Number: 3 (0x3)
        Revocation Date: Fri May 19 19:18:06 2017
    CRL Extensions:
chains.sh: #4343: OCSP: Revoking certificate with SN 4 issued by OCSPCA1  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185130 (0x1ef222ea)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Fri May 19 18:51:39 2017
            Not After : Thu May 19 18:51:39 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:54:eb:22:7b:de:a7:9e:e1:77:34:08:87:b3:00:63:
                    41:3b:c2:97:d0:9e:b2:bc:de:7e:f7:22:ae:b4:a8:fe:
                    db:bb:44:3a:6f:c1:ba:0f:8a:be:42:39:45:77:62:e9:
                    28:ce:1e:3e:0e:c2:e5:d2:bd:c7:7f:71:40:ab:67:36:
                    3c:9c:d4:11:ea:7b:8b:58:5d:2a:2e:81:bd:e4:89:ab:
                    ad:9c:23:3f:f9:ef:e7:bb:7b:89:21:75:fe:74:cc:7c:
                    9a:6a:48:5f:c2:0a:34:e8:86:80:cb:28:8e:24:45:71:
                    34:14:e8:0e:56:25:42:d8:cf:b7:71:df:d0:65:d8:eb:
                    67:89:24:4e:6e:0b:60:5e:9c:01:f0:18:42:e9:06:13:
                    11:41:70:05:6d:85:e9:fe:c1:96:67:f3:44:9d:ea:13:
                    b9:bd:85:ca:54:cb:a4:2a:bf:12:61:48:77:e7:3e:b5:
                    f2:d6:73:bf:22:d3:8c:c6:b5:7f:be:49:fb:55:f1:4d:
                    db:53:15:c7:66:d8:13:c3:01:25:56:11:19:e4:e8:2a:
                    b9:56:4d:11:0c:c0:bd:9e:da:79:b4:ed:57:78:40:57:
                    1c:43:67:00:60:1c:b7:60:4c:58:87:91:74:9a:23:bd:
                    aa:13:ce:ce:49:57:00:c4:55:e5:2e:9a:83:e8:df:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a0:ce:f5:c6:31:24:13:46:6f:1c:22:4f:09:e3:6f:f2:
        75:47:de:9a:6e:fa:d5:dc:22:29:37:7b:0c:91:36:75:
        a3:d8:d5:62:1b:65:5e:de:a7:3e:71:a7:96:61:5e:ef:
        5e:b3:0f:b6:a7:c3:93:c0:26:de:1f:cf:a8:f7:eb:94:
        61:fe:0d:c1:f6:ec:17:a7:30:6f:1a:5f:9e:33:28:a8:
        67:c5:c6:80:d0:41:18:7e:bf:06:4d:2a:9b:d3:a4:c4:
        c2:0a:15:c5:3b:f2:a4:65:9d:7f:53:0f:07:a8:b5:77:
        e0:65:42:5a:db:29:8f:36:c6:e1:54:1e:ca:2c:60:63:
        15:0c:e8:21:9c:fe:03:2d:c3:ce:81:8e:74:bf:00:a1:
        f1:b2:54:69:64:6f:70:32:ba:65:9d:24:ea:1f:38:7f:
        7e:34:11:58:7d:7d:8d:da:98:29:96:37:13:65:11:ea:
        c6:2f:5c:ee:56:40:b7:d6:5a:a9:05:ec:9a:6c:6d:1d:
        ea:c4:34:4c:a9:4a:2c:d0:db:bd:99:91:58:0d:59:da:
        4f:d4:20:31:b6:92:ef:d1:bf:cb:bf:05:88:9c:41:c0:
        94:17:77:8d:08:a1:b2:4c:0d:96:6d:00:94:70:37:d4:
        a3:c6:2a:e3:4c:df:74:07:c8:d8:fa:69:ba:29:cb:25
    Fingerprint (SHA-256):
        3A:15:DF:C9:A5:85:D7:3B:1D:B6:96:32:CB:33:CF:0B:98:41:BA:A0:32:EE:E2:41:1A:E0:EE:04:7B:2B:BB:14
    Fingerprint (SHA1):
        E2:A4:75:51:1F:B0:52:45:48:93:01:88:34:05:D0:A2:92:87:7D:FC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4344: OCSP: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4345: OCSP: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp     ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185130 (0x1ef222ea)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Fri May 19 18:51:39 2017
            Not After : Thu May 19 18:51:39 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:54:eb:22:7b:de:a7:9e:e1:77:34:08:87:b3:00:63:
                    41:3b:c2:97:d0:9e:b2:bc:de:7e:f7:22:ae:b4:a8:fe:
                    db:bb:44:3a:6f:c1:ba:0f:8a:be:42:39:45:77:62:e9:
                    28:ce:1e:3e:0e:c2:e5:d2:bd:c7:7f:71:40:ab:67:36:
                    3c:9c:d4:11:ea:7b:8b:58:5d:2a:2e:81:bd:e4:89:ab:
                    ad:9c:23:3f:f9:ef:e7:bb:7b:89:21:75:fe:74:cc:7c:
                    9a:6a:48:5f:c2:0a:34:e8:86:80:cb:28:8e:24:45:71:
                    34:14:e8:0e:56:25:42:d8:cf:b7:71:df:d0:65:d8:eb:
                    67:89:24:4e:6e:0b:60:5e:9c:01:f0:18:42:e9:06:13:
                    11:41:70:05:6d:85:e9:fe:c1:96:67:f3:44:9d:ea:13:
                    b9:bd:85:ca:54:cb:a4:2a:bf:12:61:48:77:e7:3e:b5:
                    f2:d6:73:bf:22:d3:8c:c6:b5:7f:be:49:fb:55:f1:4d:
                    db:53:15:c7:66:d8:13:c3:01:25:56:11:19:e4:e8:2a:
                    b9:56:4d:11:0c:c0:bd:9e:da:79:b4:ed:57:78:40:57:
                    1c:43:67:00:60:1c:b7:60:4c:58:87:91:74:9a:23:bd:
                    aa:13:ce:ce:49:57:00:c4:55:e5:2e:9a:83:e8:df:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a0:ce:f5:c6:31:24:13:46:6f:1c:22:4f:09:e3:6f:f2:
        75:47:de:9a:6e:fa:d5:dc:22:29:37:7b:0c:91:36:75:
        a3:d8:d5:62:1b:65:5e:de:a7:3e:71:a7:96:61:5e:ef:
        5e:b3:0f:b6:a7:c3:93:c0:26:de:1f:cf:a8:f7:eb:94:
        61:fe:0d:c1:f6:ec:17:a7:30:6f:1a:5f:9e:33:28:a8:
        67:c5:c6:80:d0:41:18:7e:bf:06:4d:2a:9b:d3:a4:c4:
        c2:0a:15:c5:3b:f2:a4:65:9d:7f:53:0f:07:a8:b5:77:
        e0:65:42:5a:db:29:8f:36:c6:e1:54:1e:ca:2c:60:63:
        15:0c:e8:21:9c:fe:03:2d:c3:ce:81:8e:74:bf:00:a1:
        f1:b2:54:69:64:6f:70:32:ba:65:9d:24:ea:1f:38:7f:
        7e:34:11:58:7d:7d:8d:da:98:29:96:37:13:65:11:ea:
        c6:2f:5c:ee:56:40:b7:d6:5a:a9:05:ec:9a:6c:6d:1d:
        ea:c4:34:4c:a9:4a:2c:d0:db:bd:99:91:58:0d:59:da:
        4f:d4:20:31:b6:92:ef:d1:bf:cb:bf:05:88:9c:41:c0:
        94:17:77:8d:08:a1:b2:4c:0d:96:6d:00:94:70:37:d4:
        a3:c6:2a:e3:4c:df:74:07:c8:d8:fa:69:ba:29:cb:25
    Fingerprint (SHA-256):
        3A:15:DF:C9:A5:85:D7:3B:1D:B6:96:32:CB:33:CF:0B:98:41:BA:A0:32:EE:E2:41:1A:E0:EE:04:7B:2B:BB:14
    Fingerprint (SHA1):
        E2:A4:75:51:1F:B0:52:45:48:93:01:88:34:05:D0:A2:92:87:7D:FC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4346: OCSP: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4347: OCSP: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp     ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185130 (0x1ef222ea)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Fri May 19 18:51:39 2017
            Not After : Thu May 19 18:51:39 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:54:eb:22:7b:de:a7:9e:e1:77:34:08:87:b3:00:63:
                    41:3b:c2:97:d0:9e:b2:bc:de:7e:f7:22:ae:b4:a8:fe:
                    db:bb:44:3a:6f:c1:ba:0f:8a:be:42:39:45:77:62:e9:
                    28:ce:1e:3e:0e:c2:e5:d2:bd:c7:7f:71:40:ab:67:36:
                    3c:9c:d4:11:ea:7b:8b:58:5d:2a:2e:81:bd:e4:89:ab:
                    ad:9c:23:3f:f9:ef:e7:bb:7b:89:21:75:fe:74:cc:7c:
                    9a:6a:48:5f:c2:0a:34:e8:86:80:cb:28:8e:24:45:71:
                    34:14:e8:0e:56:25:42:d8:cf:b7:71:df:d0:65:d8:eb:
                    67:89:24:4e:6e:0b:60:5e:9c:01:f0:18:42:e9:06:13:
                    11:41:70:05:6d:85:e9:fe:c1:96:67:f3:44:9d:ea:13:
                    b9:bd:85:ca:54:cb:a4:2a:bf:12:61:48:77:e7:3e:b5:
                    f2:d6:73:bf:22:d3:8c:c6:b5:7f:be:49:fb:55:f1:4d:
                    db:53:15:c7:66:d8:13:c3:01:25:56:11:19:e4:e8:2a:
                    b9:56:4d:11:0c:c0:bd:9e:da:79:b4:ed:57:78:40:57:
                    1c:43:67:00:60:1c:b7:60:4c:58:87:91:74:9a:23:bd:
                    aa:13:ce:ce:49:57:00:c4:55:e5:2e:9a:83:e8:df:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a0:ce:f5:c6:31:24:13:46:6f:1c:22:4f:09:e3:6f:f2:
        75:47:de:9a:6e:fa:d5:dc:22:29:37:7b:0c:91:36:75:
        a3:d8:d5:62:1b:65:5e:de:a7:3e:71:a7:96:61:5e:ef:
        5e:b3:0f:b6:a7:c3:93:c0:26:de:1f:cf:a8:f7:eb:94:
        61:fe:0d:c1:f6:ec:17:a7:30:6f:1a:5f:9e:33:28:a8:
        67:c5:c6:80:d0:41:18:7e:bf:06:4d:2a:9b:d3:a4:c4:
        c2:0a:15:c5:3b:f2:a4:65:9d:7f:53:0f:07:a8:b5:77:
        e0:65:42:5a:db:29:8f:36:c6:e1:54:1e:ca:2c:60:63:
        15:0c:e8:21:9c:fe:03:2d:c3:ce:81:8e:74:bf:00:a1:
        f1:b2:54:69:64:6f:70:32:ba:65:9d:24:ea:1f:38:7f:
        7e:34:11:58:7d:7d:8d:da:98:29:96:37:13:65:11:ea:
        c6:2f:5c:ee:56:40:b7:d6:5a:a9:05:ec:9a:6c:6d:1d:
        ea:c4:34:4c:a9:4a:2c:d0:db:bd:99:91:58:0d:59:da:
        4f:d4:20:31:b6:92:ef:d1:bf:cb:bf:05:88:9c:41:c0:
        94:17:77:8d:08:a1:b2:4c:0d:96:6d:00:94:70:37:d4:
        a3:c6:2a:e3:4c:df:74:07:c8:d8:fa:69:ba:29:cb:25
    Fingerprint (SHA-256):
        3A:15:DF:C9:A5:85:D7:3B:1D:B6:96:32:CB:33:CF:0B:98:41:BA:A0:32:EE:E2:41:1A:E0:EE:04:7B:2B:BB:14
    Fingerprint (SHA1):
        E2:A4:75:51:1F:B0:52:45:48:93:01:88:34:05:D0:A2:92:87:7D:FC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4348: OCSP: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4349: OCSP: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g chain -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g chain -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4350: OCSP: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g chain -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp     ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185130 (0x1ef222ea)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Fri May 19 18:51:39 2017
            Not After : Thu May 19 18:51:39 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:54:eb:22:7b:de:a7:9e:e1:77:34:08:87:b3:00:63:
                    41:3b:c2:97:d0:9e:b2:bc:de:7e:f7:22:ae:b4:a8:fe:
                    db:bb:44:3a:6f:c1:ba:0f:8a:be:42:39:45:77:62:e9:
                    28:ce:1e:3e:0e:c2:e5:d2:bd:c7:7f:71:40:ab:67:36:
                    3c:9c:d4:11:ea:7b:8b:58:5d:2a:2e:81:bd:e4:89:ab:
                    ad:9c:23:3f:f9:ef:e7:bb:7b:89:21:75:fe:74:cc:7c:
                    9a:6a:48:5f:c2:0a:34:e8:86:80:cb:28:8e:24:45:71:
                    34:14:e8:0e:56:25:42:d8:cf:b7:71:df:d0:65:d8:eb:
                    67:89:24:4e:6e:0b:60:5e:9c:01:f0:18:42:e9:06:13:
                    11:41:70:05:6d:85:e9:fe:c1:96:67:f3:44:9d:ea:13:
                    b9:bd:85:ca:54:cb:a4:2a:bf:12:61:48:77:e7:3e:b5:
                    f2:d6:73:bf:22:d3:8c:c6:b5:7f:be:49:fb:55:f1:4d:
                    db:53:15:c7:66:d8:13:c3:01:25:56:11:19:e4:e8:2a:
                    b9:56:4d:11:0c:c0:bd:9e:da:79:b4:ed:57:78:40:57:
                    1c:43:67:00:60:1c:b7:60:4c:58:87:91:74:9a:23:bd:
                    aa:13:ce:ce:49:57:00:c4:55:e5:2e:9a:83:e8:df:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a0:ce:f5:c6:31:24:13:46:6f:1c:22:4f:09:e3:6f:f2:
        75:47:de:9a:6e:fa:d5:dc:22:29:37:7b:0c:91:36:75:
        a3:d8:d5:62:1b:65:5e:de:a7:3e:71:a7:96:61:5e:ef:
        5e:b3:0f:b6:a7:c3:93:c0:26:de:1f:cf:a8:f7:eb:94:
        61:fe:0d:c1:f6:ec:17:a7:30:6f:1a:5f:9e:33:28:a8:
        67:c5:c6:80:d0:41:18:7e:bf:06:4d:2a:9b:d3:a4:c4:
        c2:0a:15:c5:3b:f2:a4:65:9d:7f:53:0f:07:a8:b5:77:
        e0:65:42:5a:db:29:8f:36:c6:e1:54:1e:ca:2c:60:63:
        15:0c:e8:21:9c:fe:03:2d:c3:ce:81:8e:74:bf:00:a1:
        f1:b2:54:69:64:6f:70:32:ba:65:9d:24:ea:1f:38:7f:
        7e:34:11:58:7d:7d:8d:da:98:29:96:37:13:65:11:ea:
        c6:2f:5c:ee:56:40:b7:d6:5a:a9:05:ec:9a:6c:6d:1d:
        ea:c4:34:4c:a9:4a:2c:d0:db:bd:99:91:58:0d:59:da:
        4f:d4:20:31:b6:92:ef:d1:bf:cb:bf:05:88:9c:41:c0:
        94:17:77:8d:08:a1:b2:4c:0d:96:6d:00:94:70:37:d4:
        a3:c6:2a:e3:4c:df:74:07:c8:d8:fa:69:ba:29:cb:25
    Fingerprint (SHA-256):
        3A:15:DF:C9:A5:85:D7:3B:1D:B6:96:32:CB:33:CF:0B:98:41:BA:A0:32:EE:E2:41:1A:E0:EE:04:7B:2B:BB:14
    Fingerprint (SHA1):
        E2:A4:75:51:1F:B0:52:45:48:93:01:88:34:05:D0:A2:92:87:7D:FC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US"
Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #4351: OCSP: Verifying certificate(s)  OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4352: OCSP: Verifying certificate(s)  OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s doNotUse     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp -s doNotUse     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185130 (0x1ef222ea)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Fri May 19 18:51:39 2017
            Not After : Thu May 19 18:51:39 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:54:eb:22:7b:de:a7:9e:e1:77:34:08:87:b3:00:63:
                    41:3b:c2:97:d0:9e:b2:bc:de:7e:f7:22:ae:b4:a8:fe:
                    db:bb:44:3a:6f:c1:ba:0f:8a:be:42:39:45:77:62:e9:
                    28:ce:1e:3e:0e:c2:e5:d2:bd:c7:7f:71:40:ab:67:36:
                    3c:9c:d4:11:ea:7b:8b:58:5d:2a:2e:81:bd:e4:89:ab:
                    ad:9c:23:3f:f9:ef:e7:bb:7b:89:21:75:fe:74:cc:7c:
                    9a:6a:48:5f:c2:0a:34:e8:86:80:cb:28:8e:24:45:71:
                    34:14:e8:0e:56:25:42:d8:cf:b7:71:df:d0:65:d8:eb:
                    67:89:24:4e:6e:0b:60:5e:9c:01:f0:18:42:e9:06:13:
                    11:41:70:05:6d:85:e9:fe:c1:96:67:f3:44:9d:ea:13:
                    b9:bd:85:ca:54:cb:a4:2a:bf:12:61:48:77:e7:3e:b5:
                    f2:d6:73:bf:22:d3:8c:c6:b5:7f:be:49:fb:55:f1:4d:
                    db:53:15:c7:66:d8:13:c3:01:25:56:11:19:e4:e8:2a:
                    b9:56:4d:11:0c:c0:bd:9e:da:79:b4:ed:57:78:40:57:
                    1c:43:67:00:60:1c:b7:60:4c:58:87:91:74:9a:23:bd:
                    aa:13:ce:ce:49:57:00:c4:55:e5:2e:9a:83:e8:df:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a0:ce:f5:c6:31:24:13:46:6f:1c:22:4f:09:e3:6f:f2:
        75:47:de:9a:6e:fa:d5:dc:22:29:37:7b:0c:91:36:75:
        a3:d8:d5:62:1b:65:5e:de:a7:3e:71:a7:96:61:5e:ef:
        5e:b3:0f:b6:a7:c3:93:c0:26:de:1f:cf:a8:f7:eb:94:
        61:fe:0d:c1:f6:ec:17:a7:30:6f:1a:5f:9e:33:28:a8:
        67:c5:c6:80:d0:41:18:7e:bf:06:4d:2a:9b:d3:a4:c4:
        c2:0a:15:c5:3b:f2:a4:65:9d:7f:53:0f:07:a8:b5:77:
        e0:65:42:5a:db:29:8f:36:c6:e1:54:1e:ca:2c:60:63:
        15:0c:e8:21:9c:fe:03:2d:c3:ce:81:8e:74:bf:00:a1:
        f1:b2:54:69:64:6f:70:32:ba:65:9d:24:ea:1f:38:7f:
        7e:34:11:58:7d:7d:8d:da:98:29:96:37:13:65:11:ea:
        c6:2f:5c:ee:56:40:b7:d6:5a:a9:05:ec:9a:6c:6d:1d:
        ea:c4:34:4c:a9:4a:2c:d0:db:bd:99:91:58:0d:59:da:
        4f:d4:20:31:b6:92:ef:d1:bf:cb:bf:05:88:9c:41:c0:
        94:17:77:8d:08:a1:b2:4c:0d:96:6d:00:94:70:37:d4:
        a3:c6:2a:e3:4c:df:74:07:c8:d8:fa:69:ba:29:cb:25
    Fingerprint (SHA-256):
        3A:15:DF:C9:A5:85:D7:3B:1D:B6:96:32:CB:33:CF:0B:98:41:BA:A0:32:EE:E2:41:1A:E0:EE:04:7B:2B:BB:14
    Fingerprint (SHA1):
        E2:A4:75:51:1F:B0:52:45:48:93:01:88:34:05:D0:A2:92:87:7D:FC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4353: OCSP: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s doNotUse     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s forbidFetching     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp -s forbidFetching     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185130 (0x1ef222ea)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Fri May 19 18:51:39 2017
            Not After : Thu May 19 18:51:39 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:54:eb:22:7b:de:a7:9e:e1:77:34:08:87:b3:00:63:
                    41:3b:c2:97:d0:9e:b2:bc:de:7e:f7:22:ae:b4:a8:fe:
                    db:bb:44:3a:6f:c1:ba:0f:8a:be:42:39:45:77:62:e9:
                    28:ce:1e:3e:0e:c2:e5:d2:bd:c7:7f:71:40:ab:67:36:
                    3c:9c:d4:11:ea:7b:8b:58:5d:2a:2e:81:bd:e4:89:ab:
                    ad:9c:23:3f:f9:ef:e7:bb:7b:89:21:75:fe:74:cc:7c:
                    9a:6a:48:5f:c2:0a:34:e8:86:80:cb:28:8e:24:45:71:
                    34:14:e8:0e:56:25:42:d8:cf:b7:71:df:d0:65:d8:eb:
                    67:89:24:4e:6e:0b:60:5e:9c:01:f0:18:42:e9:06:13:
                    11:41:70:05:6d:85:e9:fe:c1:96:67:f3:44:9d:ea:13:
                    b9:bd:85:ca:54:cb:a4:2a:bf:12:61:48:77:e7:3e:b5:
                    f2:d6:73:bf:22:d3:8c:c6:b5:7f:be:49:fb:55:f1:4d:
                    db:53:15:c7:66:d8:13:c3:01:25:56:11:19:e4:e8:2a:
                    b9:56:4d:11:0c:c0:bd:9e:da:79:b4:ed:57:78:40:57:
                    1c:43:67:00:60:1c:b7:60:4c:58:87:91:74:9a:23:bd:
                    aa:13:ce:ce:49:57:00:c4:55:e5:2e:9a:83:e8:df:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a0:ce:f5:c6:31:24:13:46:6f:1c:22:4f:09:e3:6f:f2:
        75:47:de:9a:6e:fa:d5:dc:22:29:37:7b:0c:91:36:75:
        a3:d8:d5:62:1b:65:5e:de:a7:3e:71:a7:96:61:5e:ef:
        5e:b3:0f:b6:a7:c3:93:c0:26:de:1f:cf:a8:f7:eb:94:
        61:fe:0d:c1:f6:ec:17:a7:30:6f:1a:5f:9e:33:28:a8:
        67:c5:c6:80:d0:41:18:7e:bf:06:4d:2a:9b:d3:a4:c4:
        c2:0a:15:c5:3b:f2:a4:65:9d:7f:53:0f:07:a8:b5:77:
        e0:65:42:5a:db:29:8f:36:c6:e1:54:1e:ca:2c:60:63:
        15:0c:e8:21:9c:fe:03:2d:c3:ce:81:8e:74:bf:00:a1:
        f1:b2:54:69:64:6f:70:32:ba:65:9d:24:ea:1f:38:7f:
        7e:34:11:58:7d:7d:8d:da:98:29:96:37:13:65:11:ea:
        c6:2f:5c:ee:56:40:b7:d6:5a:a9:05:ec:9a:6c:6d:1d:
        ea:c4:34:4c:a9:4a:2c:d0:db:bd:99:91:58:0d:59:da:
        4f:d4:20:31:b6:92:ef:d1:bf:cb:bf:05:88:9c:41:c0:
        94:17:77:8d:08:a1:b2:4c:0d:96:6d:00:94:70:37:d4:
        a3:c6:2a:e3:4c:df:74:07:c8:d8:fa:69:ba:29:cb:25
    Fingerprint (SHA-256):
        3A:15:DF:C9:A5:85:D7:3B:1D:B6:96:32:CB:33:CF:0B:98:41:BA:A0:32:EE:E2:41:1A:E0:EE:04:7B:2B:BB:14
    Fingerprint (SHA1):
        E2:A4:75:51:1F:B0:52:45:48:93:01:88:34:05:D0:A2:92:87:7D:FC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4354: OCSP: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s forbidFetching     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s failIfNoInfo     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp -s failIfNoInfo     ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8071: The OCSP server experienced an internal error.
Returned value is 1, expected result is fail
chains.sh: #4355: OCSP: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s failIfNoInfo     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s failIfNoInfo     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp -s failIfNoInfo     ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4356: OCSP: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s failIfNoInfo     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp   -g leaf -h testLocalInfoFirst -m ocsp     -t OCSPCA1
vfychain -d OCSPCA1DB -pp -vv   -g leaf -h testLocalInfoFirst -m ocsp     ../OCSPD/OCSPEE13OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPCA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Fri May 19 18:51:43 2017
            Not After : Thu May 19 18:51:43 2022
        Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:83:e5:69:c7:84:88:84:14:eb:32:02:b6:20:8c:d6:
                    fe:32:a4:70:6f:c2:ff:c0:1e:37:3f:ac:cb:5e:28:23:
                    67:37:91:9a:35:26:98:be:f5:ad:54:c0:4f:60:4c:3a:
                    0e:1f:f0:90:c8:55:b3:f8:fe:09:5f:30:5d:57:2d:34:
                    dc:8b:b7:a5:72:17:e9:98:c4:09:81:5c:64:60:a0:c4:
                    10:b1:91:27:53:78:7f:47:78:5f:22:8f:70:1d:a1:61:
                    93:08:7b:40:18:b6:c4:32:0b:f1:14:6f:a0:9c:b4:9a:
                    df:fa:5f:25:a6:f6:b0:37:de:c6:3f:59:ae:94:4d:21:
                    9f:e9:dd:fe:1c:38:0c:04:ff:73:05:c8:76:2f:fe:56:
                    be:64:5f:6a:63:80:b3:e7:6b:31:9d:e3:18:be:20:b5:
                    11:78:21:0c:83:b0:a7:9f:9e:90:f5:24:95:b4:d6:32:
                    be:54:5f:f7:0f:91:53:36:2a:5f:51:ac:e0:ea:e6:f8:
                    e8:a9:c8:23:e8:f8:b6:72:15:81:be:b1:8f:21:a5:d5:
                    bb:53:30:45:43:db:4b:2c:66:e5:78:d4:48:92:a3:f9:
                    5d:dc:81:04:ef:91:39:8d:94:3b:17:6a:19:a5:ad:d4:
                    ce:c3:b2:4a:8c:f4:29:f9:ed:a2:ac:a0:04:52:10:0d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Authority Information Access
            Method: PKIX Online Certificate Status Protocol
            Location: 
                URI: "http://127.0.0.1:8641/ocsp"

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        57:39:84:0b:44:9c:c2:18:5e:38:0a:de:9f:fb:ad:7a:
        b9:9f:1c:82:0b:07:a6:e5:91:d2:e6:9d:7a:05:85:9c:
        82:41:47:52:f3:67:ba:e2:3c:f1:7e:49:38:6d:c6:07:
        71:8a:20:e6:dd:d4:07:9e:3c:24:53:2d:4b:7b:e2:09:
        81:67:59:53:94:0b:42:7a:2d:da:98:41:2b:3f:d8:15:
        c7:30:e9:df:a6:11:4b:dc:b8:c2:49:bd:21:f1:28:1f:
        09:8c:34:f1:fc:e4:3f:ab:72:0e:96:65:2d:cf:2f:dc:
        41:7d:31:fc:23:cf:7c:b7:9d:b6:6c:df:0e:1c:7f:54:
        f6:b0:05:80:c4:98:62:4f:e3:e3:04:ac:f4:5b:b5:10:
        ed:f5:74:0d:8d:67:cd:72:45:85:a7:7e:a7:83:e1:34:
        ce:41:bc:a3:95:c7:e5:c4:6d:41:4c:fa:0a:ae:da:a7:
        67:37:73:2e:33:46:82:64:64:d5:9d:03:6f:e3:17:29:
        cb:26:e5:b3:d5:ee:d2:7f:f0:75:90:69:3e:8c:41:21:
        4f:b1:e9:2e:29:a7:04:4e:67:6e:00:71:9c:eb:28:aa:
        a8:0b:f1:03:23:11:80:9c:8d:95:fe:94:b2:6c:00:40:
        2d:0a:7e:df:9d:e0:00:22:5c:27:9e:5b:83:1a:96:01
    Fingerprint (SHA-256):
        9B:4D:18:77:89:00:A7:6E:56:CA:89:C2:E2:72:3F:81:9D:6F:DA:CF:72:BA:5D:6C:95:97:D7:53:DE:50:94:52
    Fingerprint (SHA1):
        25:D0:21:D2:C4:75:FA:58:35:81:54:82:28:51:E7:A9:FA:77:1C:43

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User

Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US"
Returned value is 0, expected result is pass
chains.sh: #4357: OCSP: Verifying certificate(s)  OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp   -g leaf -h testLocalInfoFirst -m ocsp     -t OCSPCA1 - PASSED
chains.sh: Creating DB OCSPRoot1DB
certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd
chains.sh: #4358: OCSP: Creating DB OCSPRoot1DB  - PASSED
chains.sh: Importing certificate OCSPRoot.der to OCSPRoot1DB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i ../OCSPD/OCSPRoot.der
chains.sh: #4359: OCSP: Importing certificate OCSPRoot.der to OCSPRoot1DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp   -g chain -m ocsp -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRoot1DB -pp -vv   -g chain -m ocsp -g leaf -m ocsp     ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4360: OCSP: Verifying certificate(s)  OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp   -g chain -m ocsp -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Creating DB OCSPRoot2DB
certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd
chains.sh: #4361: OCSP: Creating DB OCSPRoot2DB  - PASSED
chains.sh: Importing certificate OCSPRoot.der to OCSPRoot2DB database
certutil -A -n OCSPRoot  -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i ../OCSPD/OCSPRoot.der
chains.sh: #4362: OCSP: Importing certificate OCSPRoot.der to OCSPRoot2DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp   -g chain -m ocsp -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRoot2DB -pp -vv   -g chain -m ocsp -g leaf -m ocsp     ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185130 (0x1ef222ea)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Fri May 19 18:51:39 2017
            Not After : Thu May 19 18:51:39 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:54:eb:22:7b:de:a7:9e:e1:77:34:08:87:b3:00:63:
                    41:3b:c2:97:d0:9e:b2:bc:de:7e:f7:22:ae:b4:a8:fe:
                    db:bb:44:3a:6f:c1:ba:0f:8a:be:42:39:45:77:62:e9:
                    28:ce:1e:3e:0e:c2:e5:d2:bd:c7:7f:71:40:ab:67:36:
                    3c:9c:d4:11:ea:7b:8b:58:5d:2a:2e:81:bd:e4:89:ab:
                    ad:9c:23:3f:f9:ef:e7:bb:7b:89:21:75:fe:74:cc:7c:
                    9a:6a:48:5f:c2:0a:34:e8:86:80:cb:28:8e:24:45:71:
                    34:14:e8:0e:56:25:42:d8:cf:b7:71:df:d0:65:d8:eb:
                    67:89:24:4e:6e:0b:60:5e:9c:01:f0:18:42:e9:06:13:
                    11:41:70:05:6d:85:e9:fe:c1:96:67:f3:44:9d:ea:13:
                    b9:bd:85:ca:54:cb:a4:2a:bf:12:61:48:77:e7:3e:b5:
                    f2:d6:73:bf:22:d3:8c:c6:b5:7f:be:49:fb:55:f1:4d:
                    db:53:15:c7:66:d8:13:c3:01:25:56:11:19:e4:e8:2a:
                    b9:56:4d:11:0c:c0:bd:9e:da:79:b4:ed:57:78:40:57:
                    1c:43:67:00:60:1c:b7:60:4c:58:87:91:74:9a:23:bd:
                    aa:13:ce:ce:49:57:00:c4:55:e5:2e:9a:83:e8:df:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a0:ce:f5:c6:31:24:13:46:6f:1c:22:4f:09:e3:6f:f2:
        75:47:de:9a:6e:fa:d5:dc:22:29:37:7b:0c:91:36:75:
        a3:d8:d5:62:1b:65:5e:de:a7:3e:71:a7:96:61:5e:ef:
        5e:b3:0f:b6:a7:c3:93:c0:26:de:1f:cf:a8:f7:eb:94:
        61:fe:0d:c1:f6:ec:17:a7:30:6f:1a:5f:9e:33:28:a8:
        67:c5:c6:80:d0:41:18:7e:bf:06:4d:2a:9b:d3:a4:c4:
        c2:0a:15:c5:3b:f2:a4:65:9d:7f:53:0f:07:a8:b5:77:
        e0:65:42:5a:db:29:8f:36:c6:e1:54:1e:ca:2c:60:63:
        15:0c:e8:21:9c:fe:03:2d:c3:ce:81:8e:74:bf:00:a1:
        f1:b2:54:69:64:6f:70:32:ba:65:9d:24:ea:1f:38:7f:
        7e:34:11:58:7d:7d:8d:da:98:29:96:37:13:65:11:ea:
        c6:2f:5c:ee:56:40:b7:d6:5a:a9:05:ec:9a:6c:6d:1d:
        ea:c4:34:4c:a9:4a:2c:d0:db:bd:99:91:58:0d:59:da:
        4f:d4:20:31:b6:92:ef:d1:bf:cb:bf:05:88:9c:41:c0:
        94:17:77:8d:08:a1:b2:4c:0d:96:6d:00:94:70:37:d4:
        a3:c6:2a:e3:4c:df:74:07:c8:d8:fa:69:ba:29:cb:25
    Fingerprint (SHA-256):
        3A:15:DF:C9:A5:85:D7:3B:1D:B6:96:32:CB:33:CF:0B:98:41:BA:A0:32:EE:E2:41:1A:E0:EE:04:7B:2B:BB:14
    Fingerprint (SHA1):
        E2:A4:75:51:1F:B0:52:45:48:93:01:88:34:05:D0:A2:92:87:7D:FC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted Client CA
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4363: OCSP: Verifying certificate(s)  OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp   -g chain -m ocsp -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4364: CRLDP: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185258 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4365: CRLDP: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4366: CRLDP: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #4367: CRLDP: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA0Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4368: CRLDP: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 519185259   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4369: CRLDP: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4370: CRLDP: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4371: CRLDP: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://127.0.0.1:8641/testbuildd-8458-CA0-519185150.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4372: CRLDP: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-CA0Root-519185134.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4373: CRLDP: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4374: CRLDP: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #4375: CRLDP: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE11Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-CA0-519185150.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4376: CRLDP: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 519185260   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4377: CRLDP: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4378: CRLDP: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4379: CRLDP: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://127.0.0.1:8641/testbuildd-8458-CA0-519185150.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4380: CRLDP: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-CA0Root-519185135.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4381: CRLDP: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4382: CRLDP: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #4383: CRLDP: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE21Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4384: CRLDP: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 519185261   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4385: CRLDP: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4386: CRLDP: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4387: CRLDP: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-CA0-519185150.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4388: CRLDP: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-CA0Root-519185136.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4389: CRLDP: Creating certficate EE1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE1CA0.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4390: CRLDP: Importing certificate EE1CA0.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #4391: CRLDP: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE2Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-CA0-519185150.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4392: CRLDP: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-CA0Root-519185137.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4393: CRLDP: Creating certficate EE2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE2CA0.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4394: CRLDP: Importing certificate EE2CA0.der to EE2DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20170519191916Z
nextupdate=20180519191916Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Fri May 19 19:19:16 2017
    Next Update: Sat May 19 19:19:16 2018
    CRL Extensions:
chains.sh: #4395: CRLDP: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20170519191917Z
nextupdate=20180519191917Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Fri May 19 19:19:17 2017
    Next Update: Sat May 19 19:19:17 2018
    CRL Extensions:
chains.sh: #4396: CRLDP: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20170519191917Z
nextupdate=20180519191917Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Fri May 19 19:19:17 2017
    Next Update: Sat May 19 19:19:17 2018
    CRL Extensions:
chains.sh: #4397: CRLDP: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20170519191917Z
nextupdate=20180519191917Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Fri May 19 19:19:17 2017
    Next Update: Sat May 19 19:19:17 2018
    CRL Extensions:
chains.sh: #4398: CRLDP: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 20 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20170519191918Z
addcert 20 20170519191918Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Fri May 19 19:19:18 2017
    Next Update: Sat May 19 19:19:17 2018
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Fri May 19 19:19:18 2017
    CRL Extensions:
chains.sh: #4399: CRLDP: Revoking certificate with SN 20 issued by CA0  - PASSED
chains.sh: Revoking certificate with SN 40 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20170519191919Z
addcert 40 20170519191919Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Fri May 19 19:19:19 2017
    Next Update: Sat May 19 19:19:17 2018
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Fri May 19 19:19:18 2017
    Entry 2 (0x2):
        Serial Number: 40 (0x28)
        Revocation Date: Fri May 19 19:19:19 2017
    CRL Extensions:
chains.sh: #4400: CRLDP: Revoking certificate with SN 40 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4401: CRLDP: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4402: CRLDP: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #4403: CRLDP: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags -d AllDB -pp   -g chain -h requireFreshInfo -m crl -f    -t Root.der
vfychain -d AllDB -pp -vv   -g chain -h requireFreshInfo -m crl -f    EE11CA1.der CA1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185258 (0x1ef2236a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:18:19 2017
            Not After : Thu May 19 19:18:19 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e0:77:fc:0d:d8:ea:e6:c7:1f:f2:a6:35:50:85:31:cf:
                    bf:1b:ff:13:c3:99:e5:b9:03:53:37:fb:8f:91:4c:78:
                    17:50:83:8b:63:cc:94:e4:e2:2e:bd:f5:85:59:4b:0a:
                    00:f7:71:ec:f5:6d:12:23:59:84:e6:99:36:95:57:f0:
                    a8:c5:1f:f7:08:79:1a:42:f3:ac:d9:aa:fe:3d:55:0f:
                    69:c7:50:11:d9:83:ad:4e:8c:c1:05:7f:ec:49:13:66:
                    1c:d6:a4:59:c6:9a:06:f3:0f:3e:28:e4:02:bb:c9:25:
                    40:4a:27:02:c6:6a:ee:f2:29:66:33:54:57:b6:3c:83:
                    7c:e8:ba:75:56:c2:27:2d:f0:e7:8b:ae:1c:8a:30:d9:
                    98:fb:3e:40:0e:b2:3b:d5:c6:80:02:c1:63:26:78:58:
                    e5:34:c2:5f:70:8a:e0:cd:c6:d8:40:6a:21:86:fe:1b:
                    55:86:4e:1c:41:e0:c1:8d:a4:7b:46:1f:ce:61:9d:a4:
                    92:1e:8b:e7:ae:1f:91:3c:c9:0f:1e:fa:50:d5:1a:0e:
                    10:9b:21:2c:90:57:4b:d5:36:f6:ff:3c:4d:af:7d:a4:
                    25:59:c4:16:d1:6c:38:e6:06:75:3a:a2:21:de:c4:fe:
                    a2:1f:6d:e1:0c:b6:9d:ee:39:81:2e:b8:5b:0d:44:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        62:67:2a:a4:20:c9:ae:cd:2c:c4:b4:03:fe:18:0e:42:
        cf:a9:40:99:6d:b4:c8:55:18:5c:75:57:96:42:33:54:
        37:76:47:c9:40:64:de:b3:81:f6:28:62:24:8e:94:30:
        ac:ef:eb:b6:07:71:0d:5b:e0:0b:11:00:89:38:8e:e8:
        2d:c7:4b:6c:d2:34:6d:1d:d1:91:89:3c:9f:85:1d:fe:
        aa:75:64:87:c6:c9:75:ad:46:e6:09:a6:6c:e5:33:19:
        76:40:59:50:3c:e9:8e:7b:98:ad:87:3c:ed:a7:29:fd:
        85:7a:58:88:42:36:2c:41:f1:ec:64:2e:22:7f:1a:d3:
        56:f9:28:78:3f:e9:0c:ef:80:07:69:2f:62:d2:5c:e1:
        68:13:1c:06:02:39:d3:4f:ab:da:14:68:2f:33:b2:e5:
        17:26:58:48:60:cd:4b:b7:1c:74:12:6c:fe:09:93:c1:
        c9:37:ec:a9:1e:13:61:f9:8d:93:37:2c:0d:f4:4e:a6:
        2d:d3:5c:6c:bb:05:11:ec:c6:3e:24:f9:51:0c:63:bc:
        3d:9e:6b:2e:d4:fd:ab:90:d8:d8:66:df:b1:f4:eb:71:
        03:08:1b:47:c9:13:60:ed:24:ae:81:f6:4e:84:64:d7:
        ff:1d:b2:2d:f1:31:d4:b8:e0:ed:e1:af:78:05:68:6a
    Fingerprint (SHA-256):
        F1:5F:11:A4:9C:35:17:DF:2D:80:03:3D:D7:1E:2F:BA:02:92:03:15:EE:B5:A2:2A:D5:C6:65:83:BA:C9:EB:50
    Fingerprint (SHA1):
        49:2C:09:E4:D0:F8:87:3F:1C:0D:C9:67:C5:00:CB:9A:20:CD:72:85

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #4404: CRLDP: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags -d AllDB -pp   -g chain -h requireFreshInfo -m crl -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags -d AllDB -pp   -g chain -h requireFreshInfo -m crl -f    -t Root.der
vfychain -d AllDB -pp -vv   -g chain -h requireFreshInfo -m crl -f    EE21CA2.der CA2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4405: CRLDP: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags -d AllDB -pp   -g chain -h requireFreshInfo -m crl -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA0.der with flags -d AllDB -pp   -g leaf -h requireFreshInfo -m crl -f    -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -h requireFreshInfo -m crl -f    EE1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185258 (0x1ef2236a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:18:19 2017
            Not After : Thu May 19 19:18:19 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e0:77:fc:0d:d8:ea:e6:c7:1f:f2:a6:35:50:85:31:cf:
                    bf:1b:ff:13:c3:99:e5:b9:03:53:37:fb:8f:91:4c:78:
                    17:50:83:8b:63:cc:94:e4:e2:2e:bd:f5:85:59:4b:0a:
                    00:f7:71:ec:f5:6d:12:23:59:84:e6:99:36:95:57:f0:
                    a8:c5:1f:f7:08:79:1a:42:f3:ac:d9:aa:fe:3d:55:0f:
                    69:c7:50:11:d9:83:ad:4e:8c:c1:05:7f:ec:49:13:66:
                    1c:d6:a4:59:c6:9a:06:f3:0f:3e:28:e4:02:bb:c9:25:
                    40:4a:27:02:c6:6a:ee:f2:29:66:33:54:57:b6:3c:83:
                    7c:e8:ba:75:56:c2:27:2d:f0:e7:8b:ae:1c:8a:30:d9:
                    98:fb:3e:40:0e:b2:3b:d5:c6:80:02:c1:63:26:78:58:
                    e5:34:c2:5f:70:8a:e0:cd:c6:d8:40:6a:21:86:fe:1b:
                    55:86:4e:1c:41:e0:c1:8d:a4:7b:46:1f:ce:61:9d:a4:
                    92:1e:8b:e7:ae:1f:91:3c:c9:0f:1e:fa:50:d5:1a:0e:
                    10:9b:21:2c:90:57:4b:d5:36:f6:ff:3c:4d:af:7d:a4:
                    25:59:c4:16:d1:6c:38:e6:06:75:3a:a2:21:de:c4:fe:
                    a2:1f:6d:e1:0c:b6:9d:ee:39:81:2e:b8:5b:0d:44:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        62:67:2a:a4:20:c9:ae:cd:2c:c4:b4:03:fe:18:0e:42:
        cf:a9:40:99:6d:b4:c8:55:18:5c:75:57:96:42:33:54:
        37:76:47:c9:40:64:de:b3:81:f6:28:62:24:8e:94:30:
        ac:ef:eb:b6:07:71:0d:5b:e0:0b:11:00:89:38:8e:e8:
        2d:c7:4b:6c:d2:34:6d:1d:d1:91:89:3c:9f:85:1d:fe:
        aa:75:64:87:c6:c9:75:ad:46:e6:09:a6:6c:e5:33:19:
        76:40:59:50:3c:e9:8e:7b:98:ad:87:3c:ed:a7:29:fd:
        85:7a:58:88:42:36:2c:41:f1:ec:64:2e:22:7f:1a:d3:
        56:f9:28:78:3f:e9:0c:ef:80:07:69:2f:62:d2:5c:e1:
        68:13:1c:06:02:39:d3:4f:ab:da:14:68:2f:33:b2:e5:
        17:26:58:48:60:cd:4b:b7:1c:74:12:6c:fe:09:93:c1:
        c9:37:ec:a9:1e:13:61:f9:8d:93:37:2c:0d:f4:4e:a6:
        2d:d3:5c:6c:bb:05:11:ec:c6:3e:24:f9:51:0c:63:bc:
        3d:9e:6b:2e:d4:fd:ab:90:d8:d8:66:df:b1:f4:eb:71:
        03:08:1b:47:c9:13:60:ed:24:ae:81:f6:4e:84:64:d7:
        ff:1d:b2:2d:f1:31:d4:b8:e0:ed:e1:af:78:05:68:6a
    Fingerprint (SHA-256):
        F1:5F:11:A4:9C:35:17:DF:2D:80:03:3D:D7:1E:2F:BA:02:92:03:15:EE:B5:A2:2A:D5:C6:65:83:BA:C9:EB:50
    Fingerprint (SHA1):
        49:2C:09:E4:D0:F8:87:3F:1C:0D:C9:67:C5:00:CB:9A:20:CD:72:85

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #4406: CRLDP: Verifying certificate(s)  EE1CA0.der with flags -d AllDB -pp   -g leaf -h requireFreshInfo -m crl -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA0.der with flags -d AllDB -pp   -g leaf -h requireFreshInfo -m crl -f    -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -h requireFreshInfo -m crl -f    EE2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #4407: CRLDP: Verifying certificate(s)  EE2CA0.der with flags -d AllDB -pp   -g leaf -h requireFreshInfo -m crl -f    -t Root.der - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #4408: TrustAnchors: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185262 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4409: TrustAnchors: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #4410: TrustAnchors: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4411: TrustAnchors: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4412: TrustAnchors: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 519185263   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4413: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4414: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4415: TrustAnchors: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4416: TrustAnchors: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 519185264   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4417: TrustAnchors: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4418: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4419: TrustAnchors: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4420: TrustAnchors: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 519185265   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4421: TrustAnchors: Creating certficate EE1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE1CA2.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4422: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database  - PASSED
chains.sh: Creating DB OtherRootDB
certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd
chains.sh: #4423: TrustAnchors: Creating DB OtherRootDB  - PASSED
chains.sh: Creating Root CA OtherRoot
certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot  -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185266 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4424: TrustAnchors: Creating Root CA OtherRoot  - PASSED
chains.sh: Exporting Root CA OtherRoot.der
certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der
chains.sh: #4425: TrustAnchors: Exporting Root CA OtherRoot.der  - PASSED
chains.sh: Creating DB OtherIntermediateDB
certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd
chains.sh: #4426: TrustAnchors: Creating DB OtherIntermediateDB  - PASSED
chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der
certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US"  -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o OtherIntermediateReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4427: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der  - PASSED
chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot
certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 519185267   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4428: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot  - PASSED
chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database
certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4429: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #4430: TrustAnchors: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4431: TrustAnchors: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate
certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 519185268   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4432: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate  - PASSED
chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4433: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database  - PASSED
chains.sh: Creating DB DBOnlyDB
certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd
chains.sh: #4434: TrustAnchors: Creating DB DBOnlyDB  - PASSED
chains.sh: Importing certificate RootCA.der to DBOnlyDB database
certutil -A -n RootCA  -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der
chains.sh: #4435: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database
certutil -A -n CA1  -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der
chains.sh: #4436: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp      
vfychain -d DBOnlyDB -pp -vv       EE1CA2.der CA2CA1.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185262 (0x1ef2236e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:19:30 2017
            Not After : Thu May 19 19:19:30 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:23:34:fc:ea:48:1e:2c:b8:d7:57:73:4b:eb:65:fa:
                    1a:49:c3:a0:40:ce:65:2a:db:e7:5f:3e:3c:6b:1e:b8:
                    5a:b4:00:8c:62:48:56:d2:c1:a7:c0:7b:f2:85:aa:17:
                    3c:49:bc:b2:da:db:62:74:84:7c:eb:a1:05:e1:e9:f8:
                    da:ce:b9:96:1a:d3:2e:c0:46:6f:b0:e2:63:5f:a5:36:
                    8c:2c:19:f7:09:f4:e9:fd:2b:76:ac:dd:a1:f6:c4:08:
                    76:16:26:ee:7b:1a:7f:eb:7e:7b:3a:26:8f:80:f8:9d:
                    32:3d:71:11:ff:84:62:7d:43:cc:5f:b3:f7:6f:51:9b:
                    1c:8b:2a:4e:75:00:8b:17:a6:6d:e7:53:c1:65:e6:59:
                    04:7e:ff:0d:d0:d6:c9:aa:b5:e9:5f:70:c0:1e:c6:9e:
                    97:50:21:c7:fa:3a:81:b5:7b:9e:5f:1c:a1:33:e7:b7:
                    f8:9f:7f:82:c8:29:68:c2:37:6e:b9:2b:9b:13:dc:fb:
                    e6:9e:ab:15:a2:f7:49:2f:6f:f2:ba:db:7e:dd:58:97:
                    04:b9:64:f0:c6:da:2e:60:2e:01:8c:ca:f8:9f:3e:c3:
                    d2:df:a7:5e:a3:b4:c7:ea:7b:2b:8d:89:35:6b:7e:48:
                    cf:e3:31:ee:82:e8:db:57:df:eb:86:28:91:2d:b3:27
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        54:55:66:b6:b4:fb:80:07:2c:2a:55:a5:0f:6c:b4:c1:
        c1:e0:b8:4c:02:43:c1:f1:c2:da:22:54:1e:d7:6a:64:
        c1:be:96:32:84:9a:4e:24:6a:a2:b5:71:98:b4:46:69:
        40:bf:13:14:9c:d2:ef:bd:02:e4:5c:de:aa:50:1c:83:
        79:b9:c1:3d:ec:ee:0b:38:b5:5e:cc:87:f1:78:af:c3:
        d9:ca:0d:90:20:12:ec:05:cf:5a:5b:cb:6f:8b:e1:b5:
        3a:65:89:66:53:dd:59:47:63:8d:73:f3:7a:35:23:5f:
        6d:f5:cd:a5:b2:76:37:08:f6:0e:e4:bc:0e:68:cd:dc:
        9c:39:63:46:c3:35:fe:62:21:08:3f:39:57:96:e7:db:
        d0:3b:05:3f:8e:31:57:8e:7c:f9:1f:a3:28:7e:0a:a0:
        08:17:f1:fa:f1:61:85:0f:95:28:26:53:75:94:78:2c:
        d9:22:8d:8c:d5:05:26:3c:f9:1f:e6:f1:fc:c9:61:cb:
        83:32:a1:da:62:39:29:36:69:4a:79:44:5a:5f:cc:fa:
        78:be:3e:db:ab:78:df:89:7f:f4:ec:47:b5:44:cc:85:
        b5:8c:8c:59:8a:15:ee:13:eb:2d:eb:d7:41:df:56:a5:
        d2:2d:bd:44:74:fd:ee:c2:15:4b:f1:32:e7:6c:95:7a
    Fingerprint (SHA-256):
        E7:34:D2:4B:8B:0C:E1:6E:86:44:A7:37:7B:EC:83:8C:F7:99:DF:7F:11:DD:A8:72:BB:00:B6:60:88:5B:12:EA
    Fingerprint (SHA1):
        8A:94:83:2B:B5:CC:03:A1:F1:AB:A5:3F:5F:13:8C:78:2E:79:E6:12

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4437: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der with flags -d DBOnlyDB -pp       -t CA2CA1.der
vfychain -d DBOnlyDB -pp -vv       EE1CA2.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185264 (0x1ef22370)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 19:19:49 2017
            Not After : Thu May 19 19:19:49 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:af:1d:60:23:fa:a6:c5:09:9c:53:b0:ab:fd:7a:d3:
                    05:f8:19:7e:e2:e7:71:a2:1c:33:30:ec:c1:28:3c:70:
                    1c:66:be:eb:f2:b0:06:a6:e2:54:21:49:65:43:ab:81:
                    81:e0:19:18:2b:2e:4f:b3:9c:4a:91:4d:ee:cb:19:4e:
                    93:8f:09:a2:ff:db:4b:cd:4f:c8:6a:19:5a:af:10:cc:
                    d2:8e:78:56:db:b2:69:7d:33:e7:ee:f4:ab:1b:2d:09:
                    93:2c:6f:1e:0a:88:98:b6:66:73:08:01:9e:ae:46:b8:
                    22:9b:e9:b6:89:8f:1e:ea:63:4d:9d:6c:24:05:6a:dc:
                    8d:51:b6:c6:1f:1b:3b:4d:99:37:c5:f7:92:68:e2:35:
                    b6:93:69:63:1a:5d:b4:08:34:e8:80:b8:f4:15:52:49:
                    bd:e4:47:20:4d:09:c0:77:25:12:fc:83:1b:da:57:1d:
                    48:17:03:88:8f:3b:ab:e4:b0:43:d5:60:d4:10:ae:83:
                    8a:0b:09:d3:a2:08:ef:b1:c9:b9:11:d4:a2:19:eb:8d:
                    e9:97:97:65:e1:cc:db:b3:02:56:d1:68:4f:35:d2:cf:
                    13:27:26:ad:d0:e0:4b:26:63:8a:32:bc:59:ca:da:d3:
                    cf:fa:d5:28:13:5e:46:4f:40:dc:3d:61:38:30:74:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:79:87:77:22:f0:a0:5b:db:52:28:6c:42:8f:6f:a1:
        62:53:41:40:47:6e:df:b1:00:7d:cd:37:37:b2:91:d6:
        5e:f9:3e:61:5e:fa:54:b1:21:77:d8:43:f9:61:59:16:
        f2:30:05:7e:e9:e9:a6:4c:d6:98:46:7e:ba:73:84:fb:
        27:d3:59:02:ed:f7:ce:86:f1:25:91:1b:1c:2b:8c:94:
        c9:c6:a0:84:32:97:44:94:2b:78:69:e9:7e:79:1c:60:
        72:1f:cd:70:18:8e:82:90:70:08:f6:7b:ef:8d:dd:e8:
        6c:a3:ec:fe:e9:ef:4d:2f:c8:50:9a:67:ac:cc:f8:7a:
        9e:63:61:74:15:34:89:20:c3:3e:94:58:64:08:15:5e:
        a7:39:12:27:5d:24:7b:2f:35:d5:e8:af:cf:91:b9:cc:
        2e:ae:0b:04:43:54:a8:8f:c3:28:52:4b:71:7c:28:be:
        96:0f:31:f6:0f:c6:40:81:42:43:aa:e5:68:26:1d:cd:
        78:7a:fa:26:03:81:dd:0a:7a:60:ae:16:29:a8:fb:cc:
        38:09:91:da:36:c8:e1:f7:58:7d:29:ae:58:af:75:f3:
        51:00:ec:42:f1:f6:10:6a:95:b6:fa:27:72:37:27:48:
        58:41:7b:41:d2:18:aa:7e:e1:c9:ae:e1:93:aa:0a:a7
    Fingerprint (SHA-256):
        4D:48:F4:3D:D2:1C:0D:8D:73:0C:29:67:C9:ED:FA:C4:45:E0:61:9E:94:27:FC:1E:70:13:BD:57:E3:BA:97:C8
    Fingerprint (SHA1):
        00:2A:1A:98:C8:96:26:73:86:C9:03:CE:60:58:72:39:FD:8B:88:57


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4438: TrustAnchors: Verifying certificate(s)  EE1CA2.der with flags -d DBOnlyDB -pp       -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp       -t RootCA
vfychain -d DBOnlyDB -pp -vv       EE1CA2.der CA2CA1.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185262 (0x1ef2236e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:19:30 2017
            Not After : Thu May 19 19:19:30 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:23:34:fc:ea:48:1e:2c:b8:d7:57:73:4b:eb:65:fa:
                    1a:49:c3:a0:40:ce:65:2a:db:e7:5f:3e:3c:6b:1e:b8:
                    5a:b4:00:8c:62:48:56:d2:c1:a7:c0:7b:f2:85:aa:17:
                    3c:49:bc:b2:da:db:62:74:84:7c:eb:a1:05:e1:e9:f8:
                    da:ce:b9:96:1a:d3:2e:c0:46:6f:b0:e2:63:5f:a5:36:
                    8c:2c:19:f7:09:f4:e9:fd:2b:76:ac:dd:a1:f6:c4:08:
                    76:16:26:ee:7b:1a:7f:eb:7e:7b:3a:26:8f:80:f8:9d:
                    32:3d:71:11:ff:84:62:7d:43:cc:5f:b3:f7:6f:51:9b:
                    1c:8b:2a:4e:75:00:8b:17:a6:6d:e7:53:c1:65:e6:59:
                    04:7e:ff:0d:d0:d6:c9:aa:b5:e9:5f:70:c0:1e:c6:9e:
                    97:50:21:c7:fa:3a:81:b5:7b:9e:5f:1c:a1:33:e7:b7:
                    f8:9f:7f:82:c8:29:68:c2:37:6e:b9:2b:9b:13:dc:fb:
                    e6:9e:ab:15:a2:f7:49:2f:6f:f2:ba:db:7e:dd:58:97:
                    04:b9:64:f0:c6:da:2e:60:2e:01:8c:ca:f8:9f:3e:c3:
                    d2:df:a7:5e:a3:b4:c7:ea:7b:2b:8d:89:35:6b:7e:48:
                    cf:e3:31:ee:82:e8:db:57:df:eb:86:28:91:2d:b3:27
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        54:55:66:b6:b4:fb:80:07:2c:2a:55:a5:0f:6c:b4:c1:
        c1:e0:b8:4c:02:43:c1:f1:c2:da:22:54:1e:d7:6a:64:
        c1:be:96:32:84:9a:4e:24:6a:a2:b5:71:98:b4:46:69:
        40:bf:13:14:9c:d2:ef:bd:02:e4:5c:de:aa:50:1c:83:
        79:b9:c1:3d:ec:ee:0b:38:b5:5e:cc:87:f1:78:af:c3:
        d9:ca:0d:90:20:12:ec:05:cf:5a:5b:cb:6f:8b:e1:b5:
        3a:65:89:66:53:dd:59:47:63:8d:73:f3:7a:35:23:5f:
        6d:f5:cd:a5:b2:76:37:08:f6:0e:e4:bc:0e:68:cd:dc:
        9c:39:63:46:c3:35:fe:62:21:08:3f:39:57:96:e7:db:
        d0:3b:05:3f:8e:31:57:8e:7c:f9:1f:a3:28:7e:0a:a0:
        08:17:f1:fa:f1:61:85:0f:95:28:26:53:75:94:78:2c:
        d9:22:8d:8c:d5:05:26:3c:f9:1f:e6:f1:fc:c9:61:cb:
        83:32:a1:da:62:39:29:36:69:4a:79:44:5a:5f:cc:fa:
        78:be:3e:db:ab:78:df:89:7f:f4:ec:47:b5:44:cc:85:
        b5:8c:8c:59:8a:15:ee:13:eb:2d:eb:d7:41:df:56:a5:
        d2:2d:bd:44:74:fd:ee:c2:15:4b:f1:32:e7:6c:95:7a
    Fingerprint (SHA-256):
        E7:34:D2:4B:8B:0C:E1:6E:86:44:A7:37:7B:EC:83:8C:F7:99:DF:7F:11:DD:A8:72:BB:00:B6:60:88:5B:12:EA
    Fingerprint (SHA1):
        8A:94:83:2B:B5:CC:03:A1:F1:AB:A5:3F:5F:13:8C:78:2E:79:E6:12

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4439: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp       -t RootCA - PASSED
chains.sh: Creating DB TrustOnlyDB
certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd
chains.sh: #4440: TrustAnchors: Creating DB TrustOnlyDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp       -t RootCA.der
vfychain -d TrustOnlyDB -pp -vv       EE1CA2.der CA2CA1.der CA1RootCA.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185262 (0x1ef2236e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:19:30 2017
            Not After : Thu May 19 19:19:30 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:23:34:fc:ea:48:1e:2c:b8:d7:57:73:4b:eb:65:fa:
                    1a:49:c3:a0:40:ce:65:2a:db:e7:5f:3e:3c:6b:1e:b8:
                    5a:b4:00:8c:62:48:56:d2:c1:a7:c0:7b:f2:85:aa:17:
                    3c:49:bc:b2:da:db:62:74:84:7c:eb:a1:05:e1:e9:f8:
                    da:ce:b9:96:1a:d3:2e:c0:46:6f:b0:e2:63:5f:a5:36:
                    8c:2c:19:f7:09:f4:e9:fd:2b:76:ac:dd:a1:f6:c4:08:
                    76:16:26:ee:7b:1a:7f:eb:7e:7b:3a:26:8f:80:f8:9d:
                    32:3d:71:11:ff:84:62:7d:43:cc:5f:b3:f7:6f:51:9b:
                    1c:8b:2a:4e:75:00:8b:17:a6:6d:e7:53:c1:65:e6:59:
                    04:7e:ff:0d:d0:d6:c9:aa:b5:e9:5f:70:c0:1e:c6:9e:
                    97:50:21:c7:fa:3a:81:b5:7b:9e:5f:1c:a1:33:e7:b7:
                    f8:9f:7f:82:c8:29:68:c2:37:6e:b9:2b:9b:13:dc:fb:
                    e6:9e:ab:15:a2:f7:49:2f:6f:f2:ba:db:7e:dd:58:97:
                    04:b9:64:f0:c6:da:2e:60:2e:01:8c:ca:f8:9f:3e:c3:
                    d2:df:a7:5e:a3:b4:c7:ea:7b:2b:8d:89:35:6b:7e:48:
                    cf:e3:31:ee:82:e8:db:57:df:eb:86:28:91:2d:b3:27
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        54:55:66:b6:b4:fb:80:07:2c:2a:55:a5:0f:6c:b4:c1:
        c1:e0:b8:4c:02:43:c1:f1:c2:da:22:54:1e:d7:6a:64:
        c1:be:96:32:84:9a:4e:24:6a:a2:b5:71:98:b4:46:69:
        40:bf:13:14:9c:d2:ef:bd:02:e4:5c:de:aa:50:1c:83:
        79:b9:c1:3d:ec:ee:0b:38:b5:5e:cc:87:f1:78:af:c3:
        d9:ca:0d:90:20:12:ec:05:cf:5a:5b:cb:6f:8b:e1:b5:
        3a:65:89:66:53:dd:59:47:63:8d:73:f3:7a:35:23:5f:
        6d:f5:cd:a5:b2:76:37:08:f6:0e:e4:bc:0e:68:cd:dc:
        9c:39:63:46:c3:35:fe:62:21:08:3f:39:57:96:e7:db:
        d0:3b:05:3f:8e:31:57:8e:7c:f9:1f:a3:28:7e:0a:a0:
        08:17:f1:fa:f1:61:85:0f:95:28:26:53:75:94:78:2c:
        d9:22:8d:8c:d5:05:26:3c:f9:1f:e6:f1:fc:c9:61:cb:
        83:32:a1:da:62:39:29:36:69:4a:79:44:5a:5f:cc:fa:
        78:be:3e:db:ab:78:df:89:7f:f4:ec:47:b5:44:cc:85:
        b5:8c:8c:59:8a:15:ee:13:eb:2d:eb:d7:41:df:56:a5:
        d2:2d:bd:44:74:fd:ee:c2:15:4b:f1:32:e7:6c:95:7a
    Fingerprint (SHA-256):
        E7:34:D2:4B:8B:0C:E1:6E:86:44:A7:37:7B:EC:83:8C:F7:99:DF:7F:11:DD:A8:72:BB:00:B6:60:88:5B:12:EA
    Fingerprint (SHA1):
        8A:94:83:2B:B5:CC:03:A1:F1:AB:A5:3F:5F:13:8C:78:2E:79:E6:12


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4441: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp       -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der with flags -d TrustOnlyDB -pp       -t CA2CA1.der
vfychain -d TrustOnlyDB -pp -vv       EE1CA2.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185264 (0x1ef22370)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 19:19:49 2017
            Not After : Thu May 19 19:19:49 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:af:1d:60:23:fa:a6:c5:09:9c:53:b0:ab:fd:7a:d3:
                    05:f8:19:7e:e2:e7:71:a2:1c:33:30:ec:c1:28:3c:70:
                    1c:66:be:eb:f2:b0:06:a6:e2:54:21:49:65:43:ab:81:
                    81:e0:19:18:2b:2e:4f:b3:9c:4a:91:4d:ee:cb:19:4e:
                    93:8f:09:a2:ff:db:4b:cd:4f:c8:6a:19:5a:af:10:cc:
                    d2:8e:78:56:db:b2:69:7d:33:e7:ee:f4:ab:1b:2d:09:
                    93:2c:6f:1e:0a:88:98:b6:66:73:08:01:9e:ae:46:b8:
                    22:9b:e9:b6:89:8f:1e:ea:63:4d:9d:6c:24:05:6a:dc:
                    8d:51:b6:c6:1f:1b:3b:4d:99:37:c5:f7:92:68:e2:35:
                    b6:93:69:63:1a:5d:b4:08:34:e8:80:b8:f4:15:52:49:
                    bd:e4:47:20:4d:09:c0:77:25:12:fc:83:1b:da:57:1d:
                    48:17:03:88:8f:3b:ab:e4:b0:43:d5:60:d4:10:ae:83:
                    8a:0b:09:d3:a2:08:ef:b1:c9:b9:11:d4:a2:19:eb:8d:
                    e9:97:97:65:e1:cc:db:b3:02:56:d1:68:4f:35:d2:cf:
                    13:27:26:ad:d0:e0:4b:26:63:8a:32:bc:59:ca:da:d3:
                    cf:fa:d5:28:13:5e:46:4f:40:dc:3d:61:38:30:74:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6f:79:87:77:22:f0:a0:5b:db:52:28:6c:42:8f:6f:a1:
        62:53:41:40:47:6e:df:b1:00:7d:cd:37:37:b2:91:d6:
        5e:f9:3e:61:5e:fa:54:b1:21:77:d8:43:f9:61:59:16:
        f2:30:05:7e:e9:e9:a6:4c:d6:98:46:7e:ba:73:84:fb:
        27:d3:59:02:ed:f7:ce:86:f1:25:91:1b:1c:2b:8c:94:
        c9:c6:a0:84:32:97:44:94:2b:78:69:e9:7e:79:1c:60:
        72:1f:cd:70:18:8e:82:90:70:08:f6:7b:ef:8d:dd:e8:
        6c:a3:ec:fe:e9:ef:4d:2f:c8:50:9a:67:ac:cc:f8:7a:
        9e:63:61:74:15:34:89:20:c3:3e:94:58:64:08:15:5e:
        a7:39:12:27:5d:24:7b:2f:35:d5:e8:af:cf:91:b9:cc:
        2e:ae:0b:04:43:54:a8:8f:c3:28:52:4b:71:7c:28:be:
        96:0f:31:f6:0f:c6:40:81:42:43:aa:e5:68:26:1d:cd:
        78:7a:fa:26:03:81:dd:0a:7a:60:ae:16:29:a8:fb:cc:
        38:09:91:da:36:c8:e1:f7:58:7d:29:ae:58:af:75:f3:
        51:00:ec:42:f1:f6:10:6a:95:b6:fa:27:72:37:27:48:
        58:41:7b:41:d2:18:aa:7e:e1:c9:ae:e1:93:aa:0a:a7
    Fingerprint (SHA-256):
        4D:48:F4:3D:D2:1C:0D:8D:73:0C:29:67:C9:ED:FA:C4:45:E0:61:9E:94:27:FC:1E:70:13:BD:57:E3:BA:97:C8
    Fingerprint (SHA1):
        00:2A:1A:98:C8:96:26:73:86:C9:03:CE:60:58:72:39:FD:8B:88:57


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4442: TrustAnchors: Verifying certificate(s)  EE1CA2.der with flags -d TrustOnlyDB -pp       -t CA2CA1.der - PASSED
chains.sh: Creating DB TrustAndDBDB
certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd
chains.sh: #4443: TrustAnchors: Creating DB TrustAndDBDB  - PASSED
chains.sh: Importing certificate RootCA.der to TrustAndDBDB database
certutil -A -n RootCA  -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der
chains.sh: #4444: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database
certutil -A -n CA1  -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der
chains.sh: #4445: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp      
vfychain -d TrustAndDBDB -pp -vv       EE1CA2.der CA2CA1.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185262 (0x1ef2236e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:19:30 2017
            Not After : Thu May 19 19:19:30 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:23:34:fc:ea:48:1e:2c:b8:d7:57:73:4b:eb:65:fa:
                    1a:49:c3:a0:40:ce:65:2a:db:e7:5f:3e:3c:6b:1e:b8:
                    5a:b4:00:8c:62:48:56:d2:c1:a7:c0:7b:f2:85:aa:17:
                    3c:49:bc:b2:da:db:62:74:84:7c:eb:a1:05:e1:e9:f8:
                    da:ce:b9:96:1a:d3:2e:c0:46:6f:b0:e2:63:5f:a5:36:
                    8c:2c:19:f7:09:f4:e9:fd:2b:76:ac:dd:a1:f6:c4:08:
                    76:16:26:ee:7b:1a:7f:eb:7e:7b:3a:26:8f:80:f8:9d:
                    32:3d:71:11:ff:84:62:7d:43:cc:5f:b3:f7:6f:51:9b:
                    1c:8b:2a:4e:75:00:8b:17:a6:6d:e7:53:c1:65:e6:59:
                    04:7e:ff:0d:d0:d6:c9:aa:b5:e9:5f:70:c0:1e:c6:9e:
                    97:50:21:c7:fa:3a:81:b5:7b:9e:5f:1c:a1:33:e7:b7:
                    f8:9f:7f:82:c8:29:68:c2:37:6e:b9:2b:9b:13:dc:fb:
                    e6:9e:ab:15:a2:f7:49:2f:6f:f2:ba:db:7e:dd:58:97:
                    04:b9:64:f0:c6:da:2e:60:2e:01:8c:ca:f8:9f:3e:c3:
                    d2:df:a7:5e:a3:b4:c7:ea:7b:2b:8d:89:35:6b:7e:48:
                    cf:e3:31:ee:82:e8:db:57:df:eb:86:28:91:2d:b3:27
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        54:55:66:b6:b4:fb:80:07:2c:2a:55:a5:0f:6c:b4:c1:
        c1:e0:b8:4c:02:43:c1:f1:c2:da:22:54:1e:d7:6a:64:
        c1:be:96:32:84:9a:4e:24:6a:a2:b5:71:98:b4:46:69:
        40:bf:13:14:9c:d2:ef:bd:02:e4:5c:de:aa:50:1c:83:
        79:b9:c1:3d:ec:ee:0b:38:b5:5e:cc:87:f1:78:af:c3:
        d9:ca:0d:90:20:12:ec:05:cf:5a:5b:cb:6f:8b:e1:b5:
        3a:65:89:66:53:dd:59:47:63:8d:73:f3:7a:35:23:5f:
        6d:f5:cd:a5:b2:76:37:08:f6:0e:e4:bc:0e:68:cd:dc:
        9c:39:63:46:c3:35:fe:62:21:08:3f:39:57:96:e7:db:
        d0:3b:05:3f:8e:31:57:8e:7c:f9:1f:a3:28:7e:0a:a0:
        08:17:f1:fa:f1:61:85:0f:95:28:26:53:75:94:78:2c:
        d9:22:8d:8c:d5:05:26:3c:f9:1f:e6:f1:fc:c9:61:cb:
        83:32:a1:da:62:39:29:36:69:4a:79:44:5a:5f:cc:fa:
        78:be:3e:db:ab:78:df:89:7f:f4:ec:47:b5:44:cc:85:
        b5:8c:8c:59:8a:15:ee:13:eb:2d:eb:d7:41:df:56:a5:
        d2:2d:bd:44:74:fd:ee:c2:15:4b:f1:32:e7:6c:95:7a
    Fingerprint (SHA-256):
        E7:34:D2:4B:8B:0C:E1:6E:86:44:A7:37:7B:EC:83:8C:F7:99:DF:7F:11:DD:A8:72:BB:00:B6:60:88:5B:12:EA
    Fingerprint (SHA1):
        8A:94:83:2B:B5:CC:03:A1:F1:AB:A5:3F:5F:13:8C:78:2E:79:E6:12

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4446: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp       - PASSED
chains.sh: Verifying certificate(s)  EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp       -t OtherRoot.der
vfychain -d TrustAndDBDB -pp -vv       EE2OtherIntermediate.der OtherIntermediateOtherRoot.der  -t OtherRoot.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185266 (0x1ef22372)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US"
        Validity:
            Not Before: Fri May 19 19:20:40 2017
            Not After : Thu May 19 19:20:40 2067
        Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:cd:d3:d7:14:54:af:a0:2e:11:28:6e:a2:b9:40:19:
                    77:82:5d:89:d0:1d:69:b9:8e:c1:73:ac:b8:30:d1:8b:
                    78:be:86:56:7c:ab:9e:ec:4e:54:d9:ff:23:dc:0f:86:
                    ca:88:76:c7:99:5f:e4:5e:23:4d:e3:55:1b:42:e1:d7:
                    98:bf:ec:af:0c:5e:b8:5c:df:06:79:9b:6b:f5:1c:45:
                    45:91:96:40:4c:63:55:86:5b:7c:37:f0:64:37:a1:06:
                    99:86:ab:31:e4:60:fa:11:3e:10:0f:5a:bd:c7:5d:89:
                    c3:ff:ef:4f:01:dc:ae:6a:fc:99:42:5a:33:84:f1:81:
                    77:31:84:32:51:5e:fc:24:fd:0e:31:7b:d7:3f:76:c7:
                    a8:bd:de:ab:71:57:aa:91:7d:60:9c:8f:d9:88:2b:f1:
                    23:12:38:a1:bd:81:dd:3e:b6:81:6b:2a:d8:d1:8f:54:
                    df:53:6f:a9:79:03:00:5e:28:d4:96:2f:fe:6d:69:b7:
                    59:c5:55:4e:f0:2c:4c:57:60:40:6a:2a:11:82:4c:62:
                    6b:9d:d3:8f:3a:49:eb:57:d7:0a:a4:bb:39:85:9a:89:
                    d6:31:41:0a:0c:7e:28:83:2e:38:33:09:10:c7:4f:4b:
                    9b:ea:84:4a:d2:e7:59:d5:06:9d:64:df:18:60:3c:6b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        96:9a:42:ac:73:6e:8e:8c:4e:8e:29:0d:17:e5:12:fe:
        56:09:bb:96:91:5c:a5:99:e6:bc:73:33:23:73:34:7c:
        0b:6f:0c:72:23:a8:60:25:7c:0c:74:7e:e1:cb:1f:06:
        02:13:96:ca:e5:cd:27:6a:e8:15:7b:b2:d3:08:7a:61:
        19:3d:d7:23:a5:14:7c:18:5e:41:dc:a1:94:b3:28:89:
        7f:1d:62:b5:e7:b6:f4:ff:cc:42:ae:30:71:e8:dc:d6:
        3e:cb:09:9a:1f:93:04:b2:9b:8b:d1:9e:36:43:b4:18:
        60:44:c7:98:c7:97:54:92:d1:c5:74:48:4c:c9:c1:6e:
        f7:fc:d8:5f:73:21:37:92:fe:85:38:86:a0:82:d8:8c:
        41:9d:66:fb:42:38:b3:b3:2a:e5:b6:d7:90:7f:19:a6:
        f6:3e:7f:30:5a:9b:be:e0:fc:55:6c:05:3d:c4:54:70:
        2a:eb:99:15:f6:90:f8:ed:5c:ff:90:40:e8:e2:f4:67:
        43:a9:51:08:fe:b2:38:37:d7:2b:24:bd:68:bc:a7:b9:
        cb:56:34:b9:66:b2:1a:ec:66:1e:7e:fc:0c:d2:d7:d7:
        b8:c9:e1:72:d6:0b:ce:72:12:19:e9:5a:c6:52:77:3d:
        17:cb:a2:ab:27:0b:8f:e0:6d:c8:8b:a4:0f:a9:24:63
    Fingerprint (SHA-256):
        25:AC:B2:59:92:5A:BB:76:D2:38:02:18:4E:00:84:94:61:CF:93:1C:17:A8:97:1A:C5:F9:07:C9:23:22:5D:F8
    Fingerprint (SHA1):
        B7:F5:A5:60:64:3F:3F:8C:49:14:F9:AA:98:99:A4:23:ED:5A:7E:F3


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate
    ,C=US"
Returned value is 0, expected result is pass
chains.sh: #4447: TrustAnchors: Verifying certificate(s)  EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp       -t OtherRoot.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T      -t OtherIntermediateOtherRoot.der -t OtherRoot.der
vfychain -d TrustAndDBDB -pp -vv -T      EE1CA2.der CA2CA1.der  -t OtherIntermediateOtherRoot.der -t OtherRoot.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185262 (0x1ef2236e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:19:30 2017
            Not After : Thu May 19 19:19:30 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:23:34:fc:ea:48:1e:2c:b8:d7:57:73:4b:eb:65:fa:
                    1a:49:c3:a0:40:ce:65:2a:db:e7:5f:3e:3c:6b:1e:b8:
                    5a:b4:00:8c:62:48:56:d2:c1:a7:c0:7b:f2:85:aa:17:
                    3c:49:bc:b2:da:db:62:74:84:7c:eb:a1:05:e1:e9:f8:
                    da:ce:b9:96:1a:d3:2e:c0:46:6f:b0:e2:63:5f:a5:36:
                    8c:2c:19:f7:09:f4:e9:fd:2b:76:ac:dd:a1:f6:c4:08:
                    76:16:26:ee:7b:1a:7f:eb:7e:7b:3a:26:8f:80:f8:9d:
                    32:3d:71:11:ff:84:62:7d:43:cc:5f:b3:f7:6f:51:9b:
                    1c:8b:2a:4e:75:00:8b:17:a6:6d:e7:53:c1:65:e6:59:
                    04:7e:ff:0d:d0:d6:c9:aa:b5:e9:5f:70:c0:1e:c6:9e:
                    97:50:21:c7:fa:3a:81:b5:7b:9e:5f:1c:a1:33:e7:b7:
                    f8:9f:7f:82:c8:29:68:c2:37:6e:b9:2b:9b:13:dc:fb:
                    e6:9e:ab:15:a2:f7:49:2f:6f:f2:ba:db:7e:dd:58:97:
                    04:b9:64:f0:c6:da:2e:60:2e:01:8c:ca:f8:9f:3e:c3:
                    d2:df:a7:5e:a3:b4:c7:ea:7b:2b:8d:89:35:6b:7e:48:
                    cf:e3:31:ee:82:e8:db:57:df:eb:86:28:91:2d:b3:27
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        54:55:66:b6:b4:fb:80:07:2c:2a:55:a5:0f:6c:b4:c1:
        c1:e0:b8:4c:02:43:c1:f1:c2:da:22:54:1e:d7:6a:64:
        c1:be:96:32:84:9a:4e:24:6a:a2:b5:71:98:b4:46:69:
        40:bf:13:14:9c:d2:ef:bd:02:e4:5c:de:aa:50:1c:83:
        79:b9:c1:3d:ec:ee:0b:38:b5:5e:cc:87:f1:78:af:c3:
        d9:ca:0d:90:20:12:ec:05:cf:5a:5b:cb:6f:8b:e1:b5:
        3a:65:89:66:53:dd:59:47:63:8d:73:f3:7a:35:23:5f:
        6d:f5:cd:a5:b2:76:37:08:f6:0e:e4:bc:0e:68:cd:dc:
        9c:39:63:46:c3:35:fe:62:21:08:3f:39:57:96:e7:db:
        d0:3b:05:3f:8e:31:57:8e:7c:f9:1f:a3:28:7e:0a:a0:
        08:17:f1:fa:f1:61:85:0f:95:28:26:53:75:94:78:2c:
        d9:22:8d:8c:d5:05:26:3c:f9:1f:e6:f1:fc:c9:61:cb:
        83:32:a1:da:62:39:29:36:69:4a:79:44:5a:5f:cc:fa:
        78:be:3e:db:ab:78:df:89:7f:f4:ec:47:b5:44:cc:85:
        b5:8c:8c:59:8a:15:ee:13:eb:2d:eb:d7:41:df:56:a5:
        d2:2d:bd:44:74:fd:ee:c2:15:4b:f1:32:e7:6c:95:7a
    Fingerprint (SHA-256):
        E7:34:D2:4B:8B:0C:E1:6E:86:44:A7:37:7B:EC:83:8C:F7:99:DF:7F:11:DD:A8:72:BB:00:B6:60:88:5B:12:EA
    Fingerprint (SHA1):
        8A:94:83:2B:B5:CC:03:A1:F1:AB:A5:3F:5F:13:8C:78:2E:79:E6:12

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4448: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T      -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED
chains.sh: Creating DB ExplicitDistrustDB
certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd
chains.sh: #4449: TrustAnchors: Creating DB ExplicitDistrustDB  - PASSED
chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database
certutil -A -n RootCA  -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der
chains.sh: #4450: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database
certutil -A -n CA1  -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der
chains.sh: #4451: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database  - PASSED
chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database
certutil -A -n OtherRoot  -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der
chains.sh: #4452: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp       -t CA1RootCA.der
vfychain -d ExplicitDistrustDB -pp -vv       EE1CA2.der CA2CA1.der  -t CA1RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8171: Peer's certificate has been marked as not trusted by the user.
Returned value is 1, expected result is fail
chains.sh: #4453: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp       -t CA1RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp       -t OtherIntermediateOtherRoot.der
vfychain -d ExplicitDistrustDB -pp -vv       EE2OtherIntermediate.der  -t OtherIntermediateOtherRoot.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185267 (0x1ef22373)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US"
        Validity:
            Not Before: Fri May 19 19:20:45 2017
            Not After : Thu May 19 19:20:45 2022
        Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    fd:20:9f:a9:c6:ba:e7:9c:e3:ad:05:71:30:68:f4:16:
                    24:aa:e0:42:ba:78:7c:4e:90:2a:45:92:e7:7f:7b:ab:
                    99:32:59:70:f9:ac:32:8f:4f:45:39:1b:46:dc:02:95:
                    b2:b9:b2:b0:31:1d:15:83:22:18:07:2a:a5:a3:8a:97:
                    29:f6:98:94:85:0a:17:e0:65:2c:87:08:b6:b8:f0:c9:
                    91:fd:e4:22:9a:2d:9c:a3:60:fb:86:98:c5:90:72:dd:
                    c8:4e:b9:18:61:6f:a7:b5:13:92:60:73:b8:7f:f6:b8:
                    76:63:dc:8a:22:24:37:cb:40:b3:84:01:14:49:5f:b1:
                    03:40:30:a9:bc:7f:09:91:a8:c1:3d:f9:c8:87:32:cb:
                    43:a0:a9:0b:cb:b3:42:58:bf:64:58:7a:d3:ab:94:3d:
                    a2:ed:f1:fc:4c:0d:71:09:21:aa:72:7d:c5:c1:46:a1:
                    b9:7b:d2:12:83:6d:aa:7f:e2:b6:e5:af:a8:6c:a7:98:
                    0b:be:ad:1f:9b:c9:b3:72:50:ef:6a:4b:0c:3f:33:42:
                    7d:d1:43:4d:e4:40:52:e9:50:a2:40:fd:50:87:53:a6:
                    d9:09:73:01:eb:af:0c:eb:0e:4e:2b:d2:6f:53:75:d4:
                    ae:6c:3c:7d:a6:49:73:73:eb:56:03:1e:4f:2f:2c:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        95:ba:32:d2:6f:70:41:d2:4e:a7:96:b8:d4:c4:88:7f:
        2e:31:5b:4d:18:7f:e3:ae:b9:75:1e:26:37:c0:b0:77:
        ce:43:e8:01:b8:bc:f8:05:e5:08:a6:ce:83:c9:a0:7b:
        d0:13:cb:af:a4:b6:63:37:1d:5a:a0:ce:a5:90:93:b1:
        5c:34:99:28:d3:3f:83:74:4e:78:78:79:43:12:b1:8d:
        a3:db:b2:08:15:71:45:b5:b8:29:3e:c6:53:a2:16:31:
        a4:be:7b:ed:6a:9d:68:32:f6:0e:bd:da:89:d9:82:e2:
        a0:26:ea:a8:d0:70:d9:b5:dd:bd:9a:13:dc:66:3a:0d:
        4b:e1:60:ef:37:bb:95:00:9a:ab:d1:f1:03:74:7a:8e:
        2d:6c:93:f2:4c:f7:18:3c:a7:ee:d4:70:02:20:81:41:
        5b:96:0a:6d:19:3a:de:13:17:69:02:13:af:d7:93:71:
        2d:19:33:74:41:23:cc:05:0f:5d:d8:39:e8:4d:9c:b2:
        2f:e6:d1:98:9c:db:a5:c8:44:2c:92:f3:4c:f1:8d:63:
        4a:0d:19:1e:b1:c3:9c:a4:84:7b:90:e3:10:cf:f0:59:
        4b:b5:a4:23:44:b8:c1:d5:17:07:77:f5:d9:bd:49:fa:
        fe:9f:b7:f5:47:45:2b:02:17:28:02:57:90:2d:0e:7f
    Fingerprint (SHA-256):
        CF:1A:E5:B4:22:4F:75:FA:5A:8C:FF:B7:29:81:4D:DF:E6:5C:24:CA:85:BF:63:C8:61:7D:C3:80:A6:24:B9:03
    Fingerprint (SHA1):
        D8:62:1E:5B:E4:CB:5B:7F:E9:C3:22:83:8D:A2:1D:FD:1A:97:83:86


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4454: Verifying certificate(s)  EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp       -t OtherIntermediateOtherRoot.der - PASSED
chains.sh: Creating DB trustanchorsDB
certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd
chains.sh: #4455: TrustAnchors: Creating DB trustanchorsDB  - PASSED
chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database
certutil -A -n NameConstraints.ca  -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.ca.cert
chains.sh: #4456: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database  - PASSED
chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database
certutil -A -n NameConstraints.ncca  -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.ncca.cert
chains.sh: #4457: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database  - PASSED
chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database
certutil -A -n NameConstraints.dcisscopy  -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert
chains.sh: #4458: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database  - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server1.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]:
  ERROR -8174: security library: bad database.
Returned value is 1, expected result is fail
chains.sh: #4459: TrustAnchors: Verifying certificate(s)  NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server2.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #4460: TrustAnchors: Verifying certificate(s)  NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server3.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo
    rnia,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST
    =California,C=US"
Returned value is 0, expected result is pass
chains.sh: #4461: TrustAnchors: Verifying certificate(s)  NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]:
  ERROR -8174: security library: bad database.
Returned value is 1, expected result is fail
chains.sh: #4462: TrustAnchors: Verifying certificate(s)  NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server5.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #4463: TrustAnchors: Verifying certificate(s)  NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server6.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif
    ornia,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View,
    ST=California,C=US"
Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST
    =California,C=US"
Returned value is 0, expected result is pass
chains.sh: #4464: TrustAnchors: Verifying certificate(s)  NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server7.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US"
Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S
    T=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #4465: TrustAnchors: Verifying certificate(s)  NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server8.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US"
Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S
    T=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #4466: TrustAnchors: Verifying certificate(s)  NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server9.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]:
  ERROR -8174: security library: bad database.
Returned value is 1, expected result is fail
chains.sh: #4467: TrustAnchors: Verifying certificate(s)  NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server10.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #4468: TrustAnchors: Verifying certificate(s)  NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server11.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US"
Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S
    T=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #4469: TrustAnchors: Verifying certificate(s)  NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server12.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #4470: TrustAnchors: Verifying certificate(s)  NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server13.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]:
  ERROR -8174: security library: bad database.
Returned value is 1, expected result is fail
chains.sh: #4471: TrustAnchors: Verifying certificate(s)  NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server14.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #4472: TrustAnchors: Verifying certificate(s)  NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server15.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. NameConstraints.ncca [Certificate Authority]:
  ERROR -8157: Certificate extension not found.
Returned value is 1, expected result is fail
chains.sh: #4473: TrustAnchors: Verifying certificate(s)  NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server16.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. NameConstraints.ncca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #4474: TrustAnchors: Verifying certificate(s)  NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server17.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 2 (0x2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View,
            ST=CA,C=US"
        Validity:
            Not Before: Sat Jan 04 01:22:59 2014
            Not After : Sat Nov 04 01:22:59 2023
        Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View
            ,ST=CA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28:
                    c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4:
                    71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04:
                    4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba:
                    ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9:
                    f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85:
                    49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34:
                    a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Name Constraints
            Permitted Subtree:
                DNS name: ".example"
                    Minimum: 0 (0x0)

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91:
        33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89:
        3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a:
        9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df:
        46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b:
        c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e:
        5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd:
        df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34
    Fingerprint (SHA-256):
        63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29
    Fingerprint (SHA1):
        56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif
    ornia,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US"
Returned value is 0, expected result is pass
chains.sh: #4475: TrustAnchors: Verifying certificate(s)  NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. NameConstraints.dcisscopy [Certificate Authority]:
Email Address(es): igca@sgdn.pm.gouv.fr
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #4476: TrustAnchors: Verifying certificate(s)  NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 998899 (0xf3df3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S
            T=France,C=FR"
        Validity:
            Not Before: Sun Feb 02 17:21:27 2014
            Not After : Fri Feb 02 17:21:27 2024
        Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,
            ST=France,C=FR"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7:
                    bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed:
                    19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f:
                    1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54:
                    ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9:
                    b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a:
                    a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66:
                    de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce:
                    5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf:
                    b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01:
                    5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10:
                    10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73:
                    29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0:
                    e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26:
                    82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c:
                    65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9:
        c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a:
        b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f:
        f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43:
        2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d:
        f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3:
        a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4:
        9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04:
        82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c:
        5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e:
        bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2:
        18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1:
        f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d:
        b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db:
        9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65:
        2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b
    Fingerprint (SHA-256):
        C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C
    Fingerprint (SHA1):
        48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US"
Returned value is 0, expected result is pass
chains.sh: #4477: TrustAnchors: Verifying certificate(s)  NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp       - PASSED
trying to kill httpserv with PID 14256 at Fri May 19 19:21:18 UTC 2017
kill -USR1 14256
httpserv: normal termination
httpserv -b -p 8641 2>/dev/null;
httpserv with PID 14256 killed at Fri May 19 19:21:18 UTC 2017
httpserv starting at Fri May 19 19:21:18 UTC 2017
httpserv -D -p 8641  \
         -A OCSPRoot -C /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/OCSPCA1.crl \
         -A OCSPCA2  -C /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/OCSPCA2.crl  -A OCSPCA3 -C /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/OCSPCA3.crl \
         -O get-unknown -d /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/ServerDB/ -f /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/chains/OCSPD/ServerDB/dbpasswd \
         -i /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/aiahttp/http_pid.8458  &
trying to connect to httpserv at Fri May 19 19:21:18 UTC 2017
tstclnt -p 8641 -h 127.0.0.1 -q -v
tstclnt: connecting to 127.0.0.1:8641 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32556 >/dev/null 2>/dev/null
httpserv with PID 32556 found at Fri May 19 19:21:18 UTC 2017
httpserv with PID 32556 started at Fri May 19 19:21:18 UTC 2017
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #4478: Bridge: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185269 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4479: Bridge: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #4480: Bridge: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #4481: Bridge: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185270 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4482: Bridge: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #4483: Bridge: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #4484: Bridge: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4485: Bridge: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 519185271 -7 Bridge@Army  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4486: Bridge: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4487: Bridge: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 519185272 -7 Bridge@Navy  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4488: Bridge: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4489: Bridge: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #4490: Bridge: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #4491: Bridge: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4492: Bridge: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserBridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 519185273   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4493: Bridge: Creating certficate UserBridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate UserBridge.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4494: Bridge: Importing certificate UserBridge.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4495: Bridge: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Army.der to AllDB database
certutil -A -n Army  -t "" -d AllDB -f AllDB/dbpasswd -i Army.der
chains.sh: #4496: Bridge: Importing certificate Army.der to AllDB database  - PASSED
chains.sh: Importing certificate Navy.der to AllDB database
certutil -A -n Navy  -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der
chains.sh: #4497: Bridge: Importing certificate Navy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d AllDB -pp       -t Navy
vfychain -d AllDB -pp -vv       UserBridge.der BridgeNavy.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185270 (0x1ef22376)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 19:21:28 2017
            Not After : Thu May 19 19:21:28 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:74:d7:d6:b9:68:9c:8b:82:ee:e8:77:4e:42:36:ca:
                    32:cc:f9:05:be:1a:24:59:70:9a:47:7d:9d:f5:91:14:
                    d7:aa:3a:9b:4b:d5:f3:b5:2a:67:4f:c9:03:3f:f6:04:
                    84:80:47:f2:59:0a:bd:1c:f7:c7:6c:11:59:ca:45:a0:
                    c6:be:25:b6:ce:c7:b0:2a:bb:1c:1a:c0:2f:5a:17:ae:
                    d9:d7:84:ea:b0:cd:2e:84:54:5a:92:30:6b:a7:fd:c4:
                    1b:de:d4:31:c3:b7:21:11:3d:c9:2e:5c:6c:da:52:69:
                    d8:4f:10:97:11:6b:f0:e3:16:b0:9e:73:87:b2:79:f0:
                    25:34:aa:ff:43:72:c2:58:11:0e:fe:65:22:8c:a8:fe:
                    99:f7:8f:01:e1:80:7b:fb:89:9d:82:d1:dc:14:73:7e:
                    78:0b:85:45:61:01:dd:2e:8e:27:93:14:3b:ac:e0:eb:
                    8a:ba:ab:e1:a6:a8:bc:40:21:cc:73:15:63:5e:ed:20:
                    60:e6:00:54:8d:1c:83:36:aa:39:11:83:d6:e4:d1:1b:
                    7e:4f:e5:57:61:e9:33:56:ab:61:7d:4a:71:eb:bd:54:
                    b8:57:12:02:f3:a1:82:3a:d3:e7:97:ae:a4:af:e4:76:
                    f0:da:75:b9:27:7b:77:f1:b9:82:91:fd:34:c6:66:b3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9c:4c:0a:c6:56:91:7b:53:01:8e:64:87:ab:ec:ad:2b:
        80:58:97:17:d6:eb:fa:84:89:e9:d6:80:66:d7:6e:88:
        4a:0c:61:e7:a3:91:a6:9b:39:75:a5:47:b9:49:25:2c:
        a8:d4:87:81:52:cd:15:a3:d5:6b:72:ee:46:a5:a2:70:
        99:39:b3:31:a5:ef:92:25:66:3b:f7:6f:b0:b7:b9:a1:
        57:75:9d:fb:f1:47:44:0e:4d:bf:8b:12:f4:4f:43:ed:
        97:1b:c8:c9:94:be:a6:55:f8:22:b3:b8:0d:46:a4:9b:
        aa:73:7c:df:3e:2a:53:96:ca:5c:2e:14:2e:9b:0a:e1:
        19:95:0f:70:68:69:e3:89:89:98:04:1f:cb:73:93:1d:
        b7:91:df:61:ad:2d:6d:03:c7:0f:83:ef:12:bc:5a:a1:
        5e:19:47:5b:79:23:ad:a4:f3:3e:9e:2a:64:65:db:49:
        29:b3:35:14:de:40:4e:aa:8f:9a:14:d3:eb:08:da:fd:
        20:67:a1:01:29:38:46:af:fa:29:d5:34:f8:a6:59:bc:
        10:1b:c7:89:cd:62:64:e7:bf:6a:05:cd:5c:83:2e:15:
        c4:55:a0:39:40:b6:28:f4:ec:ce:d1:18:44:49:84:c8:
        64:2d:e3:94:b5:48:a2:f2:4d:7c:8f:66:f1:22:81:fd
    Fingerprint (SHA-256):
        09:9B:98:F7:62:C4:15:1B:ED:09:72:21:04:69:16:C2:F4:44:34:76:5C:9A:B1:E0:B2:88:DF:D9:F5:12:B4:5C
    Fingerprint (SHA1):
        0D:EF:50:86:04:65:C0:FE:6A:5D:3F:C1:D6:BA:56:A4:90:7B:10:6D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4498: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d AllDB -pp       -t Navy - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d AllDB -pp       -t Army
vfychain -d AllDB -pp -vv       UserBridge.der BridgeArmy.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185269 (0x1ef22375)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Fri May 19 19:21:25 2017
            Not After : Thu May 19 19:21:25 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9b:e3:aa:c4:4e:2c:7d:49:b3:5a:26:ad:67:8f:51:a6:
                    bf:ad:73:16:39:f9:7b:31:90:73:84:ae:ea:fb:72:cd:
                    35:b4:3f:a5:82:05:33:4f:b8:c0:d2:79:86:e0:95:6d:
                    bd:49:e5:27:aa:59:3a:cf:38:81:ca:06:93:da:17:1d:
                    7d:a3:cd:b2:7f:e2:4c:2c:cd:a8:29:fb:00:7a:9f:7f:
                    18:05:72:fe:b6:ce:5a:bd:6c:50:8e:7d:e4:00:73:b2:
                    ec:29:d1:29:64:ac:23:7a:0b:58:a0:01:92:e4:07:e1:
                    0c:97:42:fe:b1:6f:9e:78:a7:a0:23:21:8f:12:0c:37:
                    95:d3:1a:dc:8d:ae:23:ca:ec:c0:3d:a9:45:af:8f:99:
                    a4:5e:b3:fd:2b:84:9d:7e:97:4d:c7:3d:63:9f:94:ec:
                    42:14:aa:4a:1f:fc:13:c3:0e:1f:77:d9:bc:9d:8a:a9:
                    9a:ed:74:eb:ee:fa:7b:e8:a8:0e:0e:0d:12:ac:41:4e:
                    43:ee:ae:48:94:b6:4d:47:c7:61:7f:32:f2:3c:93:07:
                    d1:a1:d7:e9:73:1f:47:2d:c9:b4:5a:f4:2d:15:5d:11:
                    fb:4c:5d:90:6f:64:6b:5c:28:fb:ce:53:41:70:ec:e2:
                    94:36:aa:ca:8d:ae:70:eb:8e:ff:aa:cc:d3:8a:d9:4d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        23:5e:a8:43:65:a5:c0:10:ee:34:8c:07:00:25:7a:6c:
        1d:e2:9a:7a:46:cc:97:1a:e3:de:d8:e9:35:b2:aa:eb:
        55:7d:79:19:bf:59:47:b4:7d:15:aa:05:16:dc:b3:e4:
        73:c0:9c:c9:47:50:69:a7:90:5e:79:57:4c:de:84:78:
        25:84:c0:63:ee:c8:cb:32:65:6e:66:c7:d1:78:76:13:
        31:f2:63:62:50:18:cd:be:af:ca:4d:8d:62:bd:24:9f:
        a6:90:36:37:f9:69:e2:4b:4b:a0:de:ef:4f:72:f2:4d:
        bb:9e:de:aa:a4:7a:04:3e:78:df:7c:ab:32:49:37:46:
        05:9f:ef:49:87:b8:9f:ea:80:fa:f7:62:0a:5a:fe:20:
        a6:f0:d5:98:95:7d:a7:7f:cf:92:9c:6e:de:84:27:d0:
        c2:40:23:10:cb:63:cc:63:c0:9c:91:58:fc:29:f5:a9:
        07:d3:24:17:bc:c8:63:54:fd:96:f4:67:c0:5b:71:1f:
        90:b5:bb:6c:1b:0f:60:55:38:bd:78:34:ad:f7:85:24:
        51:59:f1:e3:87:df:80:2c:98:4e:dd:c9:d4:5f:2e:ee:
        43:82:73:24:c8:7d:78:0d:9c:14:fa:31:07:dc:76:66:
        ce:d7:bf:63:ca:d3:f6:22:8d:1c:9c:ea:05:a5:fd:d9
    Fingerprint (SHA-256):
        23:5F:65:22:63:F7:FB:69:44:AB:41:E1:68:39:57:56:AF:6D:F1:54:A1:AE:E3:DD:96:FA:1A:E4:0B:EA:5F:84
    Fingerprint (SHA1):
        69:83:71:CA:FC:68:9C:83:47:EA:89:AD:27:EF:A2:D0:67:7E:F8:EA

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4499: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d AllDB -pp       -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d AllDB -pp       -t Army
vfychain -d AllDB -pp -vv       UserBridge.der BridgeNavy.der  -t Army
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Navy [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #4500: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d AllDB -pp       -t Army - PASSED
chains.sh: Importing certificate BridgeArmy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der
chains.sh: #4501: Bridge: Importing certificate BridgeArmy.der to AllDB database  - PASSED
chains.sh: Importing certificate BridgeNavy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der
chains.sh: #4502: Bridge: Importing certificate BridgeNavy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags -d AllDB -pp       -t Army
vfychain -d AllDB -pp -vv       UserBridge.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185269 (0x1ef22375)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Fri May 19 19:21:25 2017
            Not After : Thu May 19 19:21:25 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9b:e3:aa:c4:4e:2c:7d:49:b3:5a:26:ad:67:8f:51:a6:
                    bf:ad:73:16:39:f9:7b:31:90:73:84:ae:ea:fb:72:cd:
                    35:b4:3f:a5:82:05:33:4f:b8:c0:d2:79:86:e0:95:6d:
                    bd:49:e5:27:aa:59:3a:cf:38:81:ca:06:93:da:17:1d:
                    7d:a3:cd:b2:7f:e2:4c:2c:cd:a8:29:fb:00:7a:9f:7f:
                    18:05:72:fe:b6:ce:5a:bd:6c:50:8e:7d:e4:00:73:b2:
                    ec:29:d1:29:64:ac:23:7a:0b:58:a0:01:92:e4:07:e1:
                    0c:97:42:fe:b1:6f:9e:78:a7:a0:23:21:8f:12:0c:37:
                    95:d3:1a:dc:8d:ae:23:ca:ec:c0:3d:a9:45:af:8f:99:
                    a4:5e:b3:fd:2b:84:9d:7e:97:4d:c7:3d:63:9f:94:ec:
                    42:14:aa:4a:1f:fc:13:c3:0e:1f:77:d9:bc:9d:8a:a9:
                    9a:ed:74:eb:ee:fa:7b:e8:a8:0e:0e:0d:12:ac:41:4e:
                    43:ee:ae:48:94:b6:4d:47:c7:61:7f:32:f2:3c:93:07:
                    d1:a1:d7:e9:73:1f:47:2d:c9:b4:5a:f4:2d:15:5d:11:
                    fb:4c:5d:90:6f:64:6b:5c:28:fb:ce:53:41:70:ec:e2:
                    94:36:aa:ca:8d:ae:70:eb:8e:ff:aa:cc:d3:8a:d9:4d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        23:5e:a8:43:65:a5:c0:10:ee:34:8c:07:00:25:7a:6c:
        1d:e2:9a:7a:46:cc:97:1a:e3:de:d8:e9:35:b2:aa:eb:
        55:7d:79:19:bf:59:47:b4:7d:15:aa:05:16:dc:b3:e4:
        73:c0:9c:c9:47:50:69:a7:90:5e:79:57:4c:de:84:78:
        25:84:c0:63:ee:c8:cb:32:65:6e:66:c7:d1:78:76:13:
        31:f2:63:62:50:18:cd:be:af:ca:4d:8d:62:bd:24:9f:
        a6:90:36:37:f9:69:e2:4b:4b:a0:de:ef:4f:72:f2:4d:
        bb:9e:de:aa:a4:7a:04:3e:78:df:7c:ab:32:49:37:46:
        05:9f:ef:49:87:b8:9f:ea:80:fa:f7:62:0a:5a:fe:20:
        a6:f0:d5:98:95:7d:a7:7f:cf:92:9c:6e:de:84:27:d0:
        c2:40:23:10:cb:63:cc:63:c0:9c:91:58:fc:29:f5:a9:
        07:d3:24:17:bc:c8:63:54:fd:96:f4:67:c0:5b:71:1f:
        90:b5:bb:6c:1b:0f:60:55:38:bd:78:34:ad:f7:85:24:
        51:59:f1:e3:87:df:80:2c:98:4e:dd:c9:d4:5f:2e:ee:
        43:82:73:24:c8:7d:78:0d:9c:14:fa:31:07:dc:76:66:
        ce:d7:bf:63:ca:d3:f6:22:8d:1c:9c:ea:05:a5:fd:d9
    Fingerprint (SHA-256):
        23:5F:65:22:63:F7:FB:69:44:AB:41:E1:68:39:57:56:AF:6D:F1:54:A1:AE:E3:DD:96:FA:1A:E4:0B:EA:5F:84
    Fingerprint (SHA1):
        69:83:71:CA:FC:68:9C:83:47:EA:89:AD:27:EF:A2:D0:67:7E:F8:EA

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4503: Bridge: Verifying certificate(s)  UserBridge.der with flags -d AllDB -pp       -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags -d AllDB -pp       -t Navy
vfychain -d AllDB -pp -vv       UserBridge.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185270 (0x1ef22376)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 19:21:28 2017
            Not After : Thu May 19 19:21:28 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:74:d7:d6:b9:68:9c:8b:82:ee:e8:77:4e:42:36:ca:
                    32:cc:f9:05:be:1a:24:59:70:9a:47:7d:9d:f5:91:14:
                    d7:aa:3a:9b:4b:d5:f3:b5:2a:67:4f:c9:03:3f:f6:04:
                    84:80:47:f2:59:0a:bd:1c:f7:c7:6c:11:59:ca:45:a0:
                    c6:be:25:b6:ce:c7:b0:2a:bb:1c:1a:c0:2f:5a:17:ae:
                    d9:d7:84:ea:b0:cd:2e:84:54:5a:92:30:6b:a7:fd:c4:
                    1b:de:d4:31:c3:b7:21:11:3d:c9:2e:5c:6c:da:52:69:
                    d8:4f:10:97:11:6b:f0:e3:16:b0:9e:73:87:b2:79:f0:
                    25:34:aa:ff:43:72:c2:58:11:0e:fe:65:22:8c:a8:fe:
                    99:f7:8f:01:e1:80:7b:fb:89:9d:82:d1:dc:14:73:7e:
                    78:0b:85:45:61:01:dd:2e:8e:27:93:14:3b:ac:e0:eb:
                    8a:ba:ab:e1:a6:a8:bc:40:21:cc:73:15:63:5e:ed:20:
                    60:e6:00:54:8d:1c:83:36:aa:39:11:83:d6:e4:d1:1b:
                    7e:4f:e5:57:61:e9:33:56:ab:61:7d:4a:71:eb:bd:54:
                    b8:57:12:02:f3:a1:82:3a:d3:e7:97:ae:a4:af:e4:76:
                    f0:da:75:b9:27:7b:77:f1:b9:82:91:fd:34:c6:66:b3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9c:4c:0a:c6:56:91:7b:53:01:8e:64:87:ab:ec:ad:2b:
        80:58:97:17:d6:eb:fa:84:89:e9:d6:80:66:d7:6e:88:
        4a:0c:61:e7:a3:91:a6:9b:39:75:a5:47:b9:49:25:2c:
        a8:d4:87:81:52:cd:15:a3:d5:6b:72:ee:46:a5:a2:70:
        99:39:b3:31:a5:ef:92:25:66:3b:f7:6f:b0:b7:b9:a1:
        57:75:9d:fb:f1:47:44:0e:4d:bf:8b:12:f4:4f:43:ed:
        97:1b:c8:c9:94:be:a6:55:f8:22:b3:b8:0d:46:a4:9b:
        aa:73:7c:df:3e:2a:53:96:ca:5c:2e:14:2e:9b:0a:e1:
        19:95:0f:70:68:69:e3:89:89:98:04:1f:cb:73:93:1d:
        b7:91:df:61:ad:2d:6d:03:c7:0f:83:ef:12:bc:5a:a1:
        5e:19:47:5b:79:23:ad:a4:f3:3e:9e:2a:64:65:db:49:
        29:b3:35:14:de:40:4e:aa:8f:9a:14:d3:eb:08:da:fd:
        20:67:a1:01:29:38:46:af:fa:29:d5:34:f8:a6:59:bc:
        10:1b:c7:89:cd:62:64:e7:bf:6a:05:cd:5c:83:2e:15:
        c4:55:a0:39:40:b6:28:f4:ec:ce:d1:18:44:49:84:c8:
        64:2d:e3:94:b5:48:a2:f2:4d:7c:8f:66:f1:22:81:fd
    Fingerprint (SHA-256):
        09:9B:98:F7:62:C4:15:1B:ED:09:72:21:04:69:16:C2:F4:44:34:76:5C:9A:B1:E0:B2:88:DF:D9:F5:12:B4:5C
    Fingerprint (SHA1):
        0D:EF:50:86:04:65:C0:FE:6A:5D:3F:C1:D6:BA:56:A4:90:7B:10:6D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4504: Bridge: Verifying certificate(s)  UserBridge.der with flags -d AllDB -pp       -t Navy - PASSED
chains.sh: Creating DB ArmyOnlyDB
certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd
chains.sh: #4505: Bridge: Creating DB ArmyOnlyDB  - PASSED
chains.sh: Importing certificate Army.der to ArmyOnlyDB database
certutil -A -n Army  -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der
chains.sh: #4506: Bridge: Importing certificate Army.der to ArmyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags -d ArmyOnlyDB -pp      
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #4507: Bridge: Verifying certificate(s)  UserBridge.der with flags -d ArmyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp      
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #4508: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp      
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der Navy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #4509: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp       -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der Navy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185270 (0x1ef22376)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 19:21:28 2017
            Not After : Thu May 19 19:21:28 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:74:d7:d6:b9:68:9c:8b:82:ee:e8:77:4e:42:36:ca:
                    32:cc:f9:05:be:1a:24:59:70:9a:47:7d:9d:f5:91:14:
                    d7:aa:3a:9b:4b:d5:f3:b5:2a:67:4f:c9:03:3f:f6:04:
                    84:80:47:f2:59:0a:bd:1c:f7:c7:6c:11:59:ca:45:a0:
                    c6:be:25:b6:ce:c7:b0:2a:bb:1c:1a:c0:2f:5a:17:ae:
                    d9:d7:84:ea:b0:cd:2e:84:54:5a:92:30:6b:a7:fd:c4:
                    1b:de:d4:31:c3:b7:21:11:3d:c9:2e:5c:6c:da:52:69:
                    d8:4f:10:97:11:6b:f0:e3:16:b0:9e:73:87:b2:79:f0:
                    25:34:aa:ff:43:72:c2:58:11:0e:fe:65:22:8c:a8:fe:
                    99:f7:8f:01:e1:80:7b:fb:89:9d:82:d1:dc:14:73:7e:
                    78:0b:85:45:61:01:dd:2e:8e:27:93:14:3b:ac:e0:eb:
                    8a:ba:ab:e1:a6:a8:bc:40:21:cc:73:15:63:5e:ed:20:
                    60:e6:00:54:8d:1c:83:36:aa:39:11:83:d6:e4:d1:1b:
                    7e:4f:e5:57:61:e9:33:56:ab:61:7d:4a:71:eb:bd:54:
                    b8:57:12:02:f3:a1:82:3a:d3:e7:97:ae:a4:af:e4:76:
                    f0:da:75:b9:27:7b:77:f1:b9:82:91:fd:34:c6:66:b3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9c:4c:0a:c6:56:91:7b:53:01:8e:64:87:ab:ec:ad:2b:
        80:58:97:17:d6:eb:fa:84:89:e9:d6:80:66:d7:6e:88:
        4a:0c:61:e7:a3:91:a6:9b:39:75:a5:47:b9:49:25:2c:
        a8:d4:87:81:52:cd:15:a3:d5:6b:72:ee:46:a5:a2:70:
        99:39:b3:31:a5:ef:92:25:66:3b:f7:6f:b0:b7:b9:a1:
        57:75:9d:fb:f1:47:44:0e:4d:bf:8b:12:f4:4f:43:ed:
        97:1b:c8:c9:94:be:a6:55:f8:22:b3:b8:0d:46:a4:9b:
        aa:73:7c:df:3e:2a:53:96:ca:5c:2e:14:2e:9b:0a:e1:
        19:95:0f:70:68:69:e3:89:89:98:04:1f:cb:73:93:1d:
        b7:91:df:61:ad:2d:6d:03:c7:0f:83:ef:12:bc:5a:a1:
        5e:19:47:5b:79:23:ad:a4:f3:3e:9e:2a:64:65:db:49:
        29:b3:35:14:de:40:4e:aa:8f:9a:14:d3:eb:08:da:fd:
        20:67:a1:01:29:38:46:af:fa:29:d5:34:f8:a6:59:bc:
        10:1b:c7:89:cd:62:64:e7:bf:6a:05:cd:5c:83:2e:15:
        c4:55:a0:39:40:b6:28:f4:ec:ce:d1:18:44:49:84:c8:
        64:2d:e3:94:b5:48:a2:f2:4d:7c:8f:66:f1:22:81:fd
    Fingerprint (SHA-256):
        09:9B:98:F7:62:C4:15:1B:ED:09:72:21:04:69:16:C2:F4:44:34:76:5C:9A:B1:E0:B2:88:DF:D9:F5:12:B4:5C
    Fingerprint (SHA1):
        0D:EF:50:86:04:65:C0:FE:6A:5D:3F:C1:D6:BA:56:A4:90:7B:10:6D


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4510: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp       -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp       -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv       UserBridge.der BridgeNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185270 (0x1ef22376)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 19:21:28 2017
            Not After : Thu May 19 19:21:28 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:74:d7:d6:b9:68:9c:8b:82:ee:e8:77:4e:42:36:ca:
                    32:cc:f9:05:be:1a:24:59:70:9a:47:7d:9d:f5:91:14:
                    d7:aa:3a:9b:4b:d5:f3:b5:2a:67:4f:c9:03:3f:f6:04:
                    84:80:47:f2:59:0a:bd:1c:f7:c7:6c:11:59:ca:45:a0:
                    c6:be:25:b6:ce:c7:b0:2a:bb:1c:1a:c0:2f:5a:17:ae:
                    d9:d7:84:ea:b0:cd:2e:84:54:5a:92:30:6b:a7:fd:c4:
                    1b:de:d4:31:c3:b7:21:11:3d:c9:2e:5c:6c:da:52:69:
                    d8:4f:10:97:11:6b:f0:e3:16:b0:9e:73:87:b2:79:f0:
                    25:34:aa:ff:43:72:c2:58:11:0e:fe:65:22:8c:a8:fe:
                    99:f7:8f:01:e1:80:7b:fb:89:9d:82:d1:dc:14:73:7e:
                    78:0b:85:45:61:01:dd:2e:8e:27:93:14:3b:ac:e0:eb:
                    8a:ba:ab:e1:a6:a8:bc:40:21:cc:73:15:63:5e:ed:20:
                    60:e6:00:54:8d:1c:83:36:aa:39:11:83:d6:e4:d1:1b:
                    7e:4f:e5:57:61:e9:33:56:ab:61:7d:4a:71:eb:bd:54:
                    b8:57:12:02:f3:a1:82:3a:d3:e7:97:ae:a4:af:e4:76:
                    f0:da:75:b9:27:7b:77:f1:b9:82:91:fd:34:c6:66:b3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9c:4c:0a:c6:56:91:7b:53:01:8e:64:87:ab:ec:ad:2b:
        80:58:97:17:d6:eb:fa:84:89:e9:d6:80:66:d7:6e:88:
        4a:0c:61:e7:a3:91:a6:9b:39:75:a5:47:b9:49:25:2c:
        a8:d4:87:81:52:cd:15:a3:d5:6b:72:ee:46:a5:a2:70:
        99:39:b3:31:a5:ef:92:25:66:3b:f7:6f:b0:b7:b9:a1:
        57:75:9d:fb:f1:47:44:0e:4d:bf:8b:12:f4:4f:43:ed:
        97:1b:c8:c9:94:be:a6:55:f8:22:b3:b8:0d:46:a4:9b:
        aa:73:7c:df:3e:2a:53:96:ca:5c:2e:14:2e:9b:0a:e1:
        19:95:0f:70:68:69:e3:89:89:98:04:1f:cb:73:93:1d:
        b7:91:df:61:ad:2d:6d:03:c7:0f:83:ef:12:bc:5a:a1:
        5e:19:47:5b:79:23:ad:a4:f3:3e:9e:2a:64:65:db:49:
        29:b3:35:14:de:40:4e:aa:8f:9a:14:d3:eb:08:da:fd:
        20:67:a1:01:29:38:46:af:fa:29:d5:34:f8:a6:59:bc:
        10:1b:c7:89:cd:62:64:e7:bf:6a:05:cd:5c:83:2e:15:
        c4:55:a0:39:40:b6:28:f4:ec:ce:d1:18:44:49:84:c8:
        64:2d:e3:94:b5:48:a2:f2:4d:7c:8f:66:f1:22:81:fd
    Fingerprint (SHA-256):
        09:9B:98:F7:62:C4:15:1B:ED:09:72:21:04:69:16:C2:F4:44:34:76:5C:9A:B1:E0:B2:88:DF:D9:F5:12:B4:5C
    Fingerprint (SHA1):
        0D:EF:50:86:04:65:C0:FE:6A:5D:3F:C1:D6:BA:56:A4:90:7B:10:6D


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4511: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp       -t Navy.der - PASSED
chains.sh: Creating DB NavyOnlyDB
certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd
chains.sh: #4512: Bridge: Creating DB NavyOnlyDB  - PASSED
chains.sh: Importing certificate Navy.der to NavyOnlyDB database
certutil -A -n Navy  -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der
chains.sh: #4513: Bridge: Importing certificate Navy.der to NavyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags -d NavyOnlyDB -pp      
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #4514: Bridge: Verifying certificate(s)  UserBridge.der with flags -d NavyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp      
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #4515: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp      
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der Army.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #4516: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp       -t Army.der
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der Army.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185269 (0x1ef22375)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Fri May 19 19:21:25 2017
            Not After : Thu May 19 19:21:25 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9b:e3:aa:c4:4e:2c:7d:49:b3:5a:26:ad:67:8f:51:a6:
                    bf:ad:73:16:39:f9:7b:31:90:73:84:ae:ea:fb:72:cd:
                    35:b4:3f:a5:82:05:33:4f:b8:c0:d2:79:86:e0:95:6d:
                    bd:49:e5:27:aa:59:3a:cf:38:81:ca:06:93:da:17:1d:
                    7d:a3:cd:b2:7f:e2:4c:2c:cd:a8:29:fb:00:7a:9f:7f:
                    18:05:72:fe:b6:ce:5a:bd:6c:50:8e:7d:e4:00:73:b2:
                    ec:29:d1:29:64:ac:23:7a:0b:58:a0:01:92:e4:07:e1:
                    0c:97:42:fe:b1:6f:9e:78:a7:a0:23:21:8f:12:0c:37:
                    95:d3:1a:dc:8d:ae:23:ca:ec:c0:3d:a9:45:af:8f:99:
                    a4:5e:b3:fd:2b:84:9d:7e:97:4d:c7:3d:63:9f:94:ec:
                    42:14:aa:4a:1f:fc:13:c3:0e:1f:77:d9:bc:9d:8a:a9:
                    9a:ed:74:eb:ee:fa:7b:e8:a8:0e:0e:0d:12:ac:41:4e:
                    43:ee:ae:48:94:b6:4d:47:c7:61:7f:32:f2:3c:93:07:
                    d1:a1:d7:e9:73:1f:47:2d:c9:b4:5a:f4:2d:15:5d:11:
                    fb:4c:5d:90:6f:64:6b:5c:28:fb:ce:53:41:70:ec:e2:
                    94:36:aa:ca:8d:ae:70:eb:8e:ff:aa:cc:d3:8a:d9:4d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        23:5e:a8:43:65:a5:c0:10:ee:34:8c:07:00:25:7a:6c:
        1d:e2:9a:7a:46:cc:97:1a:e3:de:d8:e9:35:b2:aa:eb:
        55:7d:79:19:bf:59:47:b4:7d:15:aa:05:16:dc:b3:e4:
        73:c0:9c:c9:47:50:69:a7:90:5e:79:57:4c:de:84:78:
        25:84:c0:63:ee:c8:cb:32:65:6e:66:c7:d1:78:76:13:
        31:f2:63:62:50:18:cd:be:af:ca:4d:8d:62:bd:24:9f:
        a6:90:36:37:f9:69:e2:4b:4b:a0:de:ef:4f:72:f2:4d:
        bb:9e:de:aa:a4:7a:04:3e:78:df:7c:ab:32:49:37:46:
        05:9f:ef:49:87:b8:9f:ea:80:fa:f7:62:0a:5a:fe:20:
        a6:f0:d5:98:95:7d:a7:7f:cf:92:9c:6e:de:84:27:d0:
        c2:40:23:10:cb:63:cc:63:c0:9c:91:58:fc:29:f5:a9:
        07:d3:24:17:bc:c8:63:54:fd:96:f4:67:c0:5b:71:1f:
        90:b5:bb:6c:1b:0f:60:55:38:bd:78:34:ad:f7:85:24:
        51:59:f1:e3:87:df:80:2c:98:4e:dd:c9:d4:5f:2e:ee:
        43:82:73:24:c8:7d:78:0d:9c:14:fa:31:07:dc:76:66:
        ce:d7:bf:63:ca:d3:f6:22:8d:1c:9c:ea:05:a5:fd:d9
    Fingerprint (SHA-256):
        23:5F:65:22:63:F7:FB:69:44:AB:41:E1:68:39:57:56:AF:6D:F1:54:A1:AE:E3:DD:96:FA:1A:E4:0B:EA:5F:84
    Fingerprint (SHA1):
        69:83:71:CA:FC:68:9C:83:47:EA:89:AD:27:EF:A2:D0:67:7E:F8:EA


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4517: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp       -t Army.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp       -t Army.der
vfychain -d NavyOnlyDB -pp -vv       UserBridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185269 (0x1ef22375)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Fri May 19 19:21:25 2017
            Not After : Thu May 19 19:21:25 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9b:e3:aa:c4:4e:2c:7d:49:b3:5a:26:ad:67:8f:51:a6:
                    bf:ad:73:16:39:f9:7b:31:90:73:84:ae:ea:fb:72:cd:
                    35:b4:3f:a5:82:05:33:4f:b8:c0:d2:79:86:e0:95:6d:
                    bd:49:e5:27:aa:59:3a:cf:38:81:ca:06:93:da:17:1d:
                    7d:a3:cd:b2:7f:e2:4c:2c:cd:a8:29:fb:00:7a:9f:7f:
                    18:05:72:fe:b6:ce:5a:bd:6c:50:8e:7d:e4:00:73:b2:
                    ec:29:d1:29:64:ac:23:7a:0b:58:a0:01:92:e4:07:e1:
                    0c:97:42:fe:b1:6f:9e:78:a7:a0:23:21:8f:12:0c:37:
                    95:d3:1a:dc:8d:ae:23:ca:ec:c0:3d:a9:45:af:8f:99:
                    a4:5e:b3:fd:2b:84:9d:7e:97:4d:c7:3d:63:9f:94:ec:
                    42:14:aa:4a:1f:fc:13:c3:0e:1f:77:d9:bc:9d:8a:a9:
                    9a:ed:74:eb:ee:fa:7b:e8:a8:0e:0e:0d:12:ac:41:4e:
                    43:ee:ae:48:94:b6:4d:47:c7:61:7f:32:f2:3c:93:07:
                    d1:a1:d7:e9:73:1f:47:2d:c9:b4:5a:f4:2d:15:5d:11:
                    fb:4c:5d:90:6f:64:6b:5c:28:fb:ce:53:41:70:ec:e2:
                    94:36:aa:ca:8d:ae:70:eb:8e:ff:aa:cc:d3:8a:d9:4d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        23:5e:a8:43:65:a5:c0:10:ee:34:8c:07:00:25:7a:6c:
        1d:e2:9a:7a:46:cc:97:1a:e3:de:d8:e9:35:b2:aa:eb:
        55:7d:79:19:bf:59:47:b4:7d:15:aa:05:16:dc:b3:e4:
        73:c0:9c:c9:47:50:69:a7:90:5e:79:57:4c:de:84:78:
        25:84:c0:63:ee:c8:cb:32:65:6e:66:c7:d1:78:76:13:
        31:f2:63:62:50:18:cd:be:af:ca:4d:8d:62:bd:24:9f:
        a6:90:36:37:f9:69:e2:4b:4b:a0:de:ef:4f:72:f2:4d:
        bb:9e:de:aa:a4:7a:04:3e:78:df:7c:ab:32:49:37:46:
        05:9f:ef:49:87:b8:9f:ea:80:fa:f7:62:0a:5a:fe:20:
        a6:f0:d5:98:95:7d:a7:7f:cf:92:9c:6e:de:84:27:d0:
        c2:40:23:10:cb:63:cc:63:c0:9c:91:58:fc:29:f5:a9:
        07:d3:24:17:bc:c8:63:54:fd:96:f4:67:c0:5b:71:1f:
        90:b5:bb:6c:1b:0f:60:55:38:bd:78:34:ad:f7:85:24:
        51:59:f1:e3:87:df:80:2c:98:4e:dd:c9:d4:5f:2e:ee:
        43:82:73:24:c8:7d:78:0d:9c:14:fa:31:07:dc:76:66:
        ce:d7:bf:63:ca:d3:f6:22:8d:1c:9c:ea:05:a5:fd:d9
    Fingerprint (SHA-256):
        23:5F:65:22:63:F7:FB:69:44:AB:41:E1:68:39:57:56:AF:6D:F1:54:A1:AE:E3:DD:96:FA:1A:E4:0B:EA:5F:84
    Fingerprint (SHA1):
        69:83:71:CA:FC:68:9C:83:47:EA:89:AD:27:EF:A2:D0:67:7E:F8:EA


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4518: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp       -t Army.der - PASSED
chains.sh: Creating DB Root1DB
certutil -N -d Root1DB -f Root1DB/dbpasswd
chains.sh: #4519: MegaBridge_3_2: Creating DB Root1DB  - PASSED
chains.sh: Creating Root CA Root1
certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1  -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185274 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4520: MegaBridge_3_2: Creating Root CA Root1  - PASSED
chains.sh: Exporting Root CA Root1.der
certutil -L -d Root1DB -r -n Root1 -o Root1.der
chains.sh: #4521: MegaBridge_3_2: Exporting Root CA Root1.der  - PASSED
chains.sh: Creating DB Root2DB
certutil -N -d Root2DB -f Root2DB/dbpasswd
chains.sh: #4522: MegaBridge_3_2: Creating DB Root2DB  - PASSED
chains.sh: Creating Root CA Root2
certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2  -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185275 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4523: MegaBridge_3_2: Creating Root CA Root2  - PASSED
chains.sh: Exporting Root CA Root2.der
certutil -L -d Root2DB -r -n Root2 -o Root2.der
chains.sh: #4524: MegaBridge_3_2: Exporting Root CA Root2.der  - PASSED
chains.sh: Creating DB Root3DB
certutil -N -d Root3DB -f Root3DB/dbpasswd
chains.sh: #4525: MegaBridge_3_2: Creating DB Root3DB  - PASSED
chains.sh: Creating Root CA Root3
certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3  -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185276 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4526: MegaBridge_3_2: Creating Root CA Root3  - PASSED
chains.sh: Exporting Root CA Root3.der
certutil -L -d Root3DB -r -n Root3 -o Root3.der
chains.sh: #4527: MegaBridge_3_2: Exporting Root CA Root3.der  - PASSED
chains.sh: Creating DB Root4DB
certutil -N -d Root4DB -f Root4DB/dbpasswd
chains.sh: #4528: MegaBridge_3_2: Creating DB Root4DB  - PASSED
chains.sh: Creating Root CA Root4
certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4  -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185277 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4529: MegaBridge_3_2: Creating Root CA Root4  - PASSED
chains.sh: Exporting Root CA Root4.der
certutil -L -d Root4DB -r -n Root4 -o Root4.der
chains.sh: #4530: MegaBridge_3_2: Exporting Root CA Root4.der  - PASSED
chains.sh: Creating DB Root5DB
certutil -N -d Root5DB -f Root5DB/dbpasswd
chains.sh: #4531: MegaBridge_3_2: Creating DB Root5DB  - PASSED
chains.sh: Creating Root CA Root5
certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5  -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185278 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4532: MegaBridge_3_2: Creating Root CA Root5  - PASSED
chains.sh: Exporting Root CA Root5.der
certutil -L -d Root5DB -r -n Root5 -o Root5.der
chains.sh: #4533: MegaBridge_3_2: Exporting Root CA Root5.der  - PASSED
chains.sh: Creating DB Root6DB
certutil -N -d Root6DB -f Root6DB/dbpasswd
chains.sh: #4534: MegaBridge_3_2: Creating DB Root6DB  - PASSED
chains.sh: Creating Root CA Root6
certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6  -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185279 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4535: MegaBridge_3_2: Creating Root CA Root6  - PASSED
chains.sh: Exporting Root CA Root6.der
certutil -L -d Root6DB -r -n Root6 -o Root6.der
chains.sh: #4536: MegaBridge_3_2: Exporting Root CA Root6.der  - PASSED
chains.sh: Creating DB Root7DB
certutil -N -d Root7DB -f Root7DB/dbpasswd
chains.sh: #4537: MegaBridge_3_2: Creating DB Root7DB  - PASSED
chains.sh: Creating Root CA Root7
certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7  -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185280 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4538: MegaBridge_3_2: Creating Root CA Root7  - PASSED
chains.sh: Exporting Root CA Root7.der
certutil -L -d Root7DB -r -n Root7 -o Root7.der
chains.sh: #4539: MegaBridge_3_2: Exporting Root CA Root7.der  - PASSED
chains.sh: Creating DB Root8DB
certutil -N -d Root8DB -f Root8DB/dbpasswd
chains.sh: #4540: MegaBridge_3_2: Creating DB Root8DB  - PASSED
chains.sh: Creating Root CA Root8
certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8  -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185281 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4541: MegaBridge_3_2: Creating Root CA Root8  - PASSED
chains.sh: Exporting Root CA Root8.der
certutil -L -d Root8DB -r -n Root8 -o Root8.der
chains.sh: #4542: MegaBridge_3_2: Exporting Root CA Root8.der  - PASSED
chains.sh: Creating DB Root9DB
certutil -N -d Root9DB -f Root9DB/dbpasswd
chains.sh: #4543: MegaBridge_3_2: Creating DB Root9DB  - PASSED
chains.sh: Creating Root CA Root9
certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9  -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185282 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4544: MegaBridge_3_2: Creating Root CA Root9  - PASSED
chains.sh: Exporting Root CA Root9.der
certutil -L -d Root9DB -r -n Root9 -o Root9.der
chains.sh: #4545: MegaBridge_3_2: Exporting Root CA Root9.der  - PASSED
chains.sh: Creating DB Bridge11DB
certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd
chains.sh: #4546: MegaBridge_3_2: Creating DB Bridge11DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge11Req.der
certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US"  -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o Bridge11Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4547: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der  - PASSED
chains.sh: Creating certficate Bridge11Root1.der signed by Root1
certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 519185283 -7 Bridge11@Root1  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4548: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1  - PASSED
chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4549: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root2.der signed by Root2
certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 519185284 -7 Bridge11@Root2  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4550: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2  - PASSED
chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4551: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root3.der signed by Root3
certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 519185285 -7 Bridge11@Root3  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4552: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3  - PASSED
chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4553: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge11DB database
cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7
chains.sh: #4554: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database  - PASSED
chains.sh: Creating DB Bridge12DB
certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd
chains.sh: #4555: MegaBridge_3_2: Creating DB Bridge12DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge12Req.der
certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US"  -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o Bridge12Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4556: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der  - PASSED
chains.sh: Creating certficate Bridge12Root4.der signed by Root4
certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 519185286 -7 Bridge12@Root4  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4557: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4  - PASSED
chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4558: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root5.der signed by Root5
certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 519185287 -7 Bridge12@Root5  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4559: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5  - PASSED
chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4560: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root6.der signed by Root6
certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 519185288 -7 Bridge12@Root6  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4561: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6  - PASSED
chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4562: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge12DB database
cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7
chains.sh: #4563: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database  - PASSED
chains.sh: Creating DB Bridge13DB
certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd
chains.sh: #4564: MegaBridge_3_2: Creating DB Bridge13DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge13Req.der
certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US"  -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o Bridge13Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4565: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der  - PASSED
chains.sh: Creating certficate Bridge13Root7.der signed by Root7
certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 519185289 -7 Bridge13@Root7  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4566: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7  - PASSED
chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4567: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root8.der signed by Root8
certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 519185290 -7 Bridge13@Root8  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4568: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8  - PASSED
chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4569: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root9.der signed by Root9
certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 519185291 -7 Bridge13@Root9  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4570: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9  - PASSED
chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4571: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge13DB database
cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7
chains.sh: #4572: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database  - PASSED
chains.sh: Creating DB Bridge21DB
certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd
chains.sh: #4573: MegaBridge_3_2: Creating DB Bridge21DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge21Req.der
certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US"  -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o Bridge21Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4574: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der  - PASSED
chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11
certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 519185292 -7 Bridge21@Bridge11  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4575: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11  - PASSED
chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4576: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12
certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 519185293 -7 Bridge21@Bridge12  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4577: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12  - PASSED
chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4578: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13
certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 519185294 -7 Bridge21@Bridge13  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4579: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13  - PASSED
chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4580: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge21DB database
cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7
chains.sh: #4581: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4582: MegaBridge_3_2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4583: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21
certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 519185295   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4584: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21  - PASSED
chains.sh: Importing certificate CA1Bridge21.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4585: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4586: MegaBridge_3_2: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4587: MegaBridge_3_2: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 519185296   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4588: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4589: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp       -t Root1.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der  -t Root1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185274 (0x1ef2237a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root1 ROOT CA,O=Root1,C=US"
        Validity:
            Not Before: Fri May 19 19:22:14 2017
            Not After : Thu May 19 19:22:14 2067
        Subject: "CN=Root1 ROOT CA,O=Root1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f2:ba:18:5b:8b:a1:42:d7:e9:a2:fd:43:f8:e7:0d:18:
                    da:94:16:50:f9:6a:cf:91:48:8a:e9:22:50:90:18:cd:
                    a6:8a:b4:1c:ae:c6:40:3e:87:79:e3:f0:05:20:47:b8:
                    31:f8:fe:67:00:bd:10:f8:48:01:d0:05:65:7d:38:e6:
                    04:35:b7:9e:86:39:8e:e3:c7:3f:55:dd:b5:f2:78:57:
                    27:0c:4d:eb:ae:00:34:86:6a:87:8c:04:b6:65:74:82:
                    ef:de:6e:f5:c5:24:9a:7f:af:3d:ab:c0:0c:92:30:b8:
                    22:5b:34:19:84:86:da:d6:9f:69:1f:96:d9:0a:36:40:
                    9e:3f:4f:60:8d:f2:11:09:09:c3:58:94:f6:02:3a:dc:
                    07:f6:87:04:2b:fa:c3:97:a6:15:31:6b:0e:6e:b6:2e:
                    81:98:4c:2a:0a:8f:3d:9b:73:ce:fa:4a:15:86:16:cb:
                    20:68:0c:97:62:32:6e:10:59:5c:5a:9a:55:a1:1b:9a:
                    7a:80:90:8b:b5:37:d8:b3:e8:26:1e:46:af:0a:00:8f:
                    9e:e6:c8:69:f6:02:fa:df:8b:38:8d:dd:2c:08:b8:02:
                    1c:58:d8:e7:c4:1f:ae:e5:1f:e6:a0:1e:65:a1:3f:60:
                    a6:1d:7e:bb:ed:bb:46:f1:31:11:60:e9:0d:69:ed:97
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        38:06:2b:5a:43:2e:64:25:ff:ab:76:6b:c2:5d:90:d2:
        bb:1e:cc:02:c9:3a:3e:eb:8a:82:84:84:fc:96:95:d1:
        0c:af:08:cb:36:c8:9b:4f:5f:98:cb:e1:2d:78:d0:53:
        5e:6e:d2:33:33:e6:29:f2:b7:0e:18:8b:a0:4a:18:be:
        c2:45:39:42:35:e0:8f:9d:f5:df:43:63:ad:3d:b7:86:
        10:eb:11:7c:66:18:bb:be:08:f0:ff:a9:6c:14:ff:f6:
        c9:37:c4:de:32:68:07:a1:eb:0a:67:56:3b:54:3f:10:
        be:74:d7:5c:d9:63:e0:ff:6c:06:cf:7b:e8:3e:b0:a5:
        e3:88:42:e1:1d:83:d5:57:b9:34:5f:98:fc:7d:48:f1:
        44:0c:da:a7:00:75:c9:20:12:b7:73:b9:ee:2c:82:a6:
        62:6c:1a:4f:6c:cc:6d:bd:8a:d7:dc:13:a9:45:63:88:
        8a:44:81:db:0a:ff:bc:25:2c:86:c9:59:ca:8e:8e:ae:
        6e:c5:ba:12:1e:a2:0c:4d:f2:e8:03:06:cf:a0:13:11:
        8c:3d:f2:cf:85:3b:18:86:8b:d2:82:1d:01:48:b1:c7:
        5c:44:d6:c9:19:5f:d2:3b:64:d0:07:17:ca:65:92:05:
        de:c8:19:5a:1f:b3:56:05:29:46:0b:3d:e7:f8:fa:84
    Fingerprint (SHA-256):
        31:79:1C:A2:15:4E:80:2D:DF:6B:46:3C:D9:D0:89:F3:F0:85:26:E6:3E:48:8F:BF:B7:3B:EE:B8:D1:7D:DA:3B
    Fingerprint (SHA1):
        40:DD:3F:E2:10:21:56:F0:10:9B:DC:50:DD:8F:42:E1:1B:03:C0:89


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #4590: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp       -t Root1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp       -t Root2.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der  -t Root2.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185275 (0x1ef2237b)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root2 ROOT CA,O=Root2,C=US"
        Validity:
            Not Before: Fri May 19 19:22:16 2017
            Not After : Thu May 19 19:22:16 2067
        Subject: "CN=Root2 ROOT CA,O=Root2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a2:69:a5:44:12:f1:ad:64:69:15:0e:88:40:2e:ce:33:
                    1f:a8:bd:e1:13:dd:69:60:94:14:2f:d2:4e:c0:5f:3b:
                    e0:fd:e5:32:4d:eb:5d:6a:ce:6a:de:53:7f:fb:32:62:
                    6c:0b:9e:b2:70:bf:e4:f6:82:fa:85:66:9e:af:67:e2:
                    86:ab:dd:7c:9c:db:f5:fe:90:9f:14:ee:36:f4:17:03:
                    8f:8a:74:b0:2b:5d:f3:14:d0:9e:cd:34:c8:98:c4:b6:
                    4f:12:c0:a1:d1:68:9a:43:3e:5b:b5:0e:76:6a:f7:d4:
                    7c:b9:85:2f:05:24:67:bf:56:d8:11:91:2c:ef:9e:09:
                    0b:34:20:56:07:d8:a1:d0:5e:c6:95:6a:9f:e8:9e:eb:
                    40:0f:c4:4f:40:ef:af:9a:47:3b:fb:0d:9c:f1:9b:fa:
                    ff:92:92:7d:ae:62:b1:6f:7b:45:9e:84:4d:ba:76:c0:
                    ca:47:c5:dd:87:2c:8c:f8:83:c1:29:23:d1:39:31:ff:
                    90:31:cf:96:a2:0d:cd:dc:98:79:d0:7e:41:78:b5:ba:
                    61:18:34:ac:64:eb:40:c9:2b:d2:81:07:08:4f:13:97:
                    8d:15:36:ae:58:71:5b:df:cc:e2:d0:54:5d:8c:3f:5d:
                    04:c8:d1:b8:6c:24:08:d9:a1:64:43:ce:65:36:c2:a9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a1:85:d0:2d:4f:4c:1b:2c:f9:10:3b:5c:09:c7:cc:50:
        7b:aa:f4:61:6a:de:8a:bd:b7:3b:a3:6b:76:7c:c4:82:
        69:5a:00:b4:43:6e:a2:60:b6:f0:b3:ef:d7:32:0f:e6:
        df:92:20:9d:bc:eb:1b:9b:b8:c3:fb:bf:8a:e4:47:97:
        b0:ec:e8:2a:7b:bc:43:19:d7:26:d6:1a:89:7b:94:53:
        d0:ee:69:30:0f:cc:75:5b:9c:90:4c:eb:9c:dc:7d:e5:
        98:6d:84:87:4f:54:db:1a:9a:b1:89:40:23:a5:a9:de:
        3f:23:4c:93:fc:3e:5d:e6:ea:e6:16:c8:28:92:86:01:
        0c:77:75:2c:2b:99:66:bc:56:a0:58:d1:18:bd:22:9f:
        7d:59:16:04:af:a6:eb:49:6b:11:e8:6c:71:f6:60:a8:
        cc:ae:3b:62:2c:d7:96:70:ed:dc:f9:9e:2b:4e:2a:5f:
        06:69:da:60:17:6e:60:d0:12:98:01:35:2d:11:df:bb:
        09:e8:cf:64:3c:ea:3f:1a:0a:e9:9c:ab:d6:2f:49:5f:
        98:da:1f:80:80:ca:25:72:17:b9:24:aa:d7:8f:2a:0c:
        dd:f0:d4:b2:1c:e6:2c:32:0b:e4:f1:f5:c3:8e:75:07:
        d2:d0:90:a4:a1:8f:b4:2e:0d:92:e0:06:26:70:cd:bb
    Fingerprint (SHA-256):
        DD:1F:4B:AF:1E:4E:0F:6D:26:EF:80:16:D8:60:4D:2A:66:9F:63:59:35:18:EA:A1:69:4E:D3:90:2D:55:9F:AB
    Fingerprint (SHA1):
        6D:70:14:E8:7A:40:FF:40:43:09:76:54:B0:D3:E7:7B:DB:02:14:5C


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #4591: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp       -t Root2.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp       -t Root3.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der  -t Root3.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185276 (0x1ef2237c)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root3 ROOT CA,O=Root3,C=US"
        Validity:
            Not Before: Fri May 19 19:22:28 2017
            Not After : Thu May 19 19:22:28 2067
        Subject: "CN=Root3 ROOT CA,O=Root3,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:78:09:d3:3e:65:ea:b0:0c:99:bd:44:85:55:ec:b2:
                    26:8d:a6:00:18:ae:b1:f3:8a:a5:04:07:bc:72:26:55:
                    3a:25:ce:45:3e:15:5e:5f:f5:7f:7b:45:08:fc:75:7c:
                    68:42:99:94:1e:95:17:fc:4d:73:46:30:50:69:63:6d:
                    2d:83:3a:d5:60:68:9f:37:d1:ed:f5:7d:a8:11:2f:b9:
                    e6:c4:17:62:29:39:f3:5a:b4:1b:28:72:53:1c:e2:ca:
                    00:1e:c0:69:d8:31:9d:f0:da:42:0b:12:a6:7f:c4:a8:
                    5f:54:bd:b0:f2:c1:84:35:09:72:58:44:f6:64:ef:23:
                    dd:88:61:13:7a:64:3b:a0:c9:e6:6d:38:28:5c:20:d2:
                    2d:00:b7:9f:00:7e:db:72:a9:ad:6e:c1:7d:5a:de:04:
                    9b:25:81:3d:79:38:e9:28:27:4a:17:f2:fd:8a:a1:62:
                    38:13:e3:d3:42:70:22:27:8b:c1:59:99:bc:f6:59:92:
                    b4:11:9b:a0:61:5f:80:7a:8a:c5:79:d2:7f:fa:0c:a8:
                    5b:4e:d9:9c:03:db:ad:3f:c3:04:b6:c7:fd:2d:41:bf:
                    7d:05:1c:bc:d5:8d:3a:96:c4:3e:4f:64:55:a9:5f:96:
                    98:31:ed:b2:23:d0:24:d3:4e:c7:3b:07:72:cb:5c:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        66:aa:e0:2a:0b:7a:f4:9e:bd:5a:a3:24:2c:00:c3:5a:
        f8:9e:be:81:05:ed:76:b9:f3:3d:30:67:20:34:74:a0:
        63:49:dc:91:2f:84:55:2f:6b:c6:c3:96:54:5e:fe:78:
        a8:9e:21:7e:34:2d:76:92:7a:a3:42:87:e9:f5:ec:33:
        0c:31:3e:10:41:bf:ff:07:0c:6a:67:ef:d7:82:8e:0e:
        b5:20:2b:15:0a:e5:a5:30:26:58:61:1f:24:7a:73:c7:
        e1:2e:3b:f7:82:e4:c0:a2:78:89:48:49:52:f4:ca:4e:
        54:90:ea:65:47:fa:76:02:a3:da:e2:8a:26:fd:2e:c8:
        55:c8:d7:18:3f:fc:ad:1a:de:2a:94:44:44:39:7b:3c:
        92:f0:a7:9b:8b:85:bb:ff:72:ad:6d:0e:17:2b:df:34:
        49:0d:1f:07:70:e9:3f:63:54:28:c0:5a:79:71:4a:d0:
        47:9b:d2:22:78:39:57:5a:16:6d:13:71:59:b2:3c:3b:
        65:28:32:a3:c4:dc:b6:4d:a2:fc:2e:6a:c4:8e:88:1e:
        f0:0c:bf:78:90:9d:f8:37:b8:6a:bf:01:c3:f4:19:7d:
        6b:94:d6:28:27:96:97:3f:9d:6b:a5:c7:96:e4:6e:e2:
        46:c2:c8:09:66:55:c6:24:34:ca:42:ec:1f:00:d1:4d
    Fingerprint (SHA-256):
        73:53:E1:C3:4D:7E:ED:95:1B:37:5C:6C:9B:7A:3F:A3:A5:8B:96:4E:E7:73:A9:92:47:0D:45:BD:6E:E7:0C:3C
    Fingerprint (SHA1):
        4B:AA:4A:99:1D:AE:6A:0D:50:17:20:CE:72:93:F7:73:CF:B8:93:70


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #4592: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp       -t Root3.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp       -t Root4.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der  -t Root4.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185277 (0x1ef2237d)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root4 ROOT CA,O=Root4,C=US"
        Validity:
            Not Before: Fri May 19 19:22:39 2017
            Not After : Thu May 19 19:22:39 2067
        Subject: "CN=Root4 ROOT CA,O=Root4,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ae:cd:d1:39:0b:6f:25:64:12:80:3a:6e:1c:6d:78:e3:
                    2d:6e:69:9d:02:2a:9c:ec:dc:54:0a:62:0f:05:e2:e7:
                    db:fe:45:22:9e:5d:5a:5d:e2:35:9b:84:42:c7:f2:8f:
                    ae:57:f3:1a:09:ae:31:e4:5d:de:5b:28:69:0c:1d:a5:
                    18:73:a6:3f:0f:39:c4:94:98:bd:e1:33:b7:0d:72:ff:
                    7b:81:15:0a:4e:91:30:3a:a4:e7:7f:f3:09:cb:dd:c4:
                    40:ad:a0:54:75:10:87:56:a4:52:27:e0:28:be:38:60:
                    cf:ce:46:b0:45:d2:d5:0b:da:30:53:a1:ee:22:54:e9:
                    00:9a:08:2f:be:df:ae:e5:66:b3:88:d6:fb:6f:25:32:
                    80:5a:42:6b:e8:5c:84:95:ed:64:ea:e8:0f:92:7b:ef:
                    14:4e:5f:73:1d:12:c7:3a:e2:9f:29:cb:b1:eb:93:35:
                    71:bc:35:f2:17:3c:33:f1:ef:cb:da:41:40:94:01:c8:
                    9f:d3:80:d1:39:93:d7:61:71:9f:13:93:a5:08:ad:c0:
                    0e:72:e6:ba:f6:99:87:27:d9:fb:dd:d0:07:82:22:a1:
                    2b:44:bd:23:d6:4f:80:d7:3e:56:d2:ac:6b:45:2f:8b:
                    66:7a:18:c0:9b:6d:c2:7f:e6:a0:a8:d2:a8:98:d7:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a8:31:79:c0:9b:3d:69:ce:1a:71:9c:31:8b:c0:53:92:
        c4:3c:ff:9a:e9:1f:98:18:55:da:1c:61:3c:e4:72:ee:
        0f:4a:c3:37:e4:ff:2d:08:cb:04:bb:7f:57:bf:79:73:
        08:37:9a:a6:ca:63:5f:2d:3d:5b:f6:70:54:dc:42:82:
        e5:3d:c8:75:29:50:f1:9b:60:9c:a0:4f:51:3f:fb:c6:
        29:1e:cb:53:41:23:af:f5:6f:7a:f1:f9:15:39:7b:4d:
        db:bb:67:45:0b:e1:d0:8f:4b:ea:dc:b9:7b:4d:fa:c6:
        6d:be:62:9d:a6:56:1d:55:b3:74:cd:79:3d:5e:29:fa:
        b8:6c:b0:63:29:cb:0d:8d:d9:a1:cc:40:a8:26:00:d6:
        d3:2b:dc:0b:ab:4c:ca:6f:87:03:7b:fe:dd:0e:6a:a8:
        ac:f5:5c:a3:50:15:91:d3:df:25:0a:b0:7a:15:14:02:
        26:3a:9c:59:f8:2a:c1:46:ff:97:b0:81:12:96:f3:97:
        a9:8c:f3:4e:9a:8b:8e:1a:f5:bc:15:92:67:42:d8:72:
        69:c2:3a:34:b0:7f:7d:ab:39:ce:77:a1:8a:27:c0:c9:
        59:56:d7:1f:9f:87:a8:f6:0f:2d:19:92:92:7e:6f:4a:
        80:b5:ef:d5:95:0b:2a:6c:a0:b0:26:4c:79:4d:6e:9d
    Fingerprint (SHA-256):
        C5:1E:A9:6A:87:42:83:FB:16:0D:AA:41:D0:B7:8E:B2:E4:57:5F:BB:FF:12:3A:4D:B3:C3:20:93:2D:DC:DA:95
    Fingerprint (SHA1):
        F9:1A:A8:CD:83:77:86:7F:08:44:A1:26:92:C6:0D:AC:DA:10:C1:7E


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #4593: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp       -t Root4.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp       -t Root5.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der  -t Root5.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185278 (0x1ef2237e)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root5 ROOT CA,O=Root5,C=US"
        Validity:
            Not Before: Fri May 19 19:22:44 2017
            Not After : Thu May 19 19:22:44 2067
        Subject: "CN=Root5 ROOT CA,O=Root5,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ec:52:16:19:3b:21:1b:48:94:48:9a:7f:48:c4:2b:91:
                    ff:36:b3:e2:ef:fe:c8:3b:85:fd:af:a1:67:9d:9f:28:
                    f8:c7:cf:26:a0:d0:c2:37:20:20:65:ca:c1:04:a7:7a:
                    36:10:f8:99:1d:60:95:13:6c:90:4e:47:8d:b1:61:2d:
                    f3:6c:a0:e9:21:93:28:5a:20:51:93:24:55:35:52:6f:
                    2b:cd:a3:54:34:f5:c3:4e:66:ee:3f:3e:64:53:a7:d0:
                    84:19:4e:51:e1:ef:67:94:08:8a:a5:04:5c:12:67:26:
                    56:9a:ad:b5:36:29:ce:5b:da:60:d5:3b:16:8e:0c:22:
                    ec:53:e9:d4:ab:1f:ba:df:6d:fe:2d:60:a2:5f:17:a1:
                    57:35:28:96:d9:ea:de:c9:7a:1f:6f:11:41:12:7d:43:
                    63:5b:78:75:97:88:60:07:dc:d0:7b:13:0e:4d:05:cb:
                    a1:d3:8b:d2:29:2a:5a:47:1f:92:70:3c:f8:80:dc:82:
                    72:bf:3e:d4:50:9f:e9:60:01:b4:81:b4:6f:9c:e0:53:
                    e2:03:8b:22:4a:34:6e:91:0c:55:43:05:a3:7a:6f:e1:
                    1e:ca:e0:f0:1f:7a:73:a8:71:b8:eb:ae:25:b3:5b:b6:
                    d3:9d:52:ee:a9:96:cf:d8:23:99:9a:53:9f:15:48:95
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        90:97:c2:ea:69:e1:9a:a4:59:4b:3c:4e:67:19:11:3b:
        e0:e4:90:d0:54:a1:1a:a2:0b:e6:54:00:4a:c8:21:c2:
        c9:37:4d:00:1d:ec:9a:e4:19:ab:87:20:57:74:36:f0:
        0d:d0:8a:10:e5:78:2c:a2:ec:b4:66:7b:ed:3b:4b:77:
        15:50:56:8e:f9:62:b9:24:4e:65:19:fb:a9:25:87:3b:
        68:99:bf:90:66:02:dc:b7:ae:c9:6b:5d:ee:2b:64:e1:
        d2:11:85:ae:03:d3:be:2c:8e:4d:63:42:80:e3:2b:5f:
        70:2b:1f:8c:4b:f1:37:76:21:e4:47:56:3e:6d:5d:46:
        a9:27:a3:e7:18:8a:94:5a:b6:64:c8:95:fc:f9:03:0b:
        3a:66:6a:e0:af:b1:80:00:cd:29:dd:c0:1d:a3:cc:6c:
        e0:18:ed:5f:a4:d9:34:55:8b:13:3b:f6:23:c3:14:e7:
        6b:51:f2:bc:11:16:75:8f:50:99:4d:d9:8d:16:8c:4d:
        a4:51:cd:13:71:f1:48:d7:1e:64:eb:89:02:0d:79:41:
        17:eb:15:7c:6b:57:fd:e6:95:9e:b3:a4:07:19:5c:ef:
        87:28:5c:9a:7e:0e:0a:36:1a:40:22:4d:96:83:fe:1f:
        69:a6:9f:ed:2d:5e:18:2f:e8:73:c4:9f:66:20:22:4c
    Fingerprint (SHA-256):
        4F:DE:4C:6F:06:88:E9:04:53:B0:3E:BD:3A:F0:FD:93:F8:34:42:9A:8E:85:28:10:31:34:2F:17:A9:83:73:AB
    Fingerprint (SHA1):
        EB:EA:B4:00:FC:8C:34:3A:C6:03:A5:FD:BB:7E:52:07:43:B8:15:E8


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #4594: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp       -t Root5.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp       -t Root6.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der  -t Root6.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185279 (0x1ef2237f)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root6 ROOT CA,O=Root6,C=US"
        Validity:
            Not Before: Fri May 19 19:22:54 2017
            Not After : Thu May 19 19:22:54 2067
        Subject: "CN=Root6 ROOT CA,O=Root6,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:0c:ab:6f:10:04:86:0d:56:d0:22:39:a6:bd:af:13:
                    fa:ac:bf:50:14:62:c0:11:de:c3:52:ad:b8:c2:72:13:
                    26:60:c1:de:70:05:ff:78:80:dd:63:c7:17:74:c6:14:
                    5e:9b:07:65:30:e0:d0:84:4f:6b:40:a8:8f:02:fc:4a:
                    ac:45:e5:ea:86:6b:92:21:03:68:8c:58:82:b0:32:bf:
                    24:f4:a9:39:dc:31:36:83:4f:2a:34:b6:7e:86:1d:b2:
                    55:74:64:e8:fe:d1:45:7f:14:36:74:54:5a:0f:5c:8c:
                    0c:a7:82:cf:58:d6:f7:53:45:f6:18:db:70:53:77:51:
                    96:9d:ed:9f:75:b5:d0:35:e2:1a:d6:aa:a0:2a:69:66:
                    3f:38:ae:30:44:dd:e1:2a:a0:d8:2e:80:68:b0:3c:cd:
                    a6:b7:92:b2:ec:73:1f:b7:e1:d3:ea:fd:60:fa:19:c8:
                    e5:d0:ed:e0:10:96:bf:a4:e6:2a:ea:d8:aa:56:e4:95:
                    fe:71:45:5d:37:37:25:90:3c:66:00:c8:de:0c:b4:62:
                    c9:68:d9:94:62:21:42:df:36:64:04:6a:2d:f1:2c:f1:
                    92:7d:8a:3e:6e:f4:9b:6d:ac:fc:81:b3:76:56:15:a0:
                    7a:c2:40:2f:77:89:b8:ad:a4:47:63:67:6c:84:7e:bf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        09:d8:66:1b:a9:b6:14:75:33:17:7c:b9:63:bc:38:79:
        64:9d:60:c3:be:02:cb:14:5e:53:c1:c1:18:5b:15:78:
        4d:1c:5e:07:bc:ca:a1:98:97:44:65:9d:72:43:96:cf:
        b6:8c:5e:47:e4:08:03:df:e0:91:a2:6b:24:d0:90:25:
        19:2c:e1:7c:f1:e8:99:ca:26:6a:57:d6:40:26:1a:02:
        a0:6d:48:33:5c:66:87:3d:62:4a:b7:d5:78:1f:c4:29:
        da:66:73:cd:35:2f:91:05:1a:5d:b9:4a:6d:39:69:73:
        9f:59:7b:e8:2b:6d:1b:f9:0a:86:df:84:33:7c:0b:01:
        56:b8:9e:c9:16:a1:22:95:a9:ed:0f:65:a3:df:73:08:
        6e:d2:e9:31:2c:03:47:dc:10:10:5f:12:79:58:4a:73:
        31:91:38:8c:0f:82:47:b3:8d:ff:0a:e3:51:15:86:59:
        69:2c:b2:0a:e7:99:09:c1:bd:10:33:4f:eb:a8:d7:a0:
        b1:99:67:a4:8e:d5:34:ac:f6:38:45:d8:a3:59:52:82:
        30:c6:5b:1f:41:f1:1d:4d:2f:24:ad:eb:81:36:eb:3f:
        9b:14:63:f3:d8:12:aa:9a:ef:19:b2:4f:c5:8b:ab:7f:
        b5:3a:b7:ab:80:2e:ab:6a:7b:2b:ab:e7:34:d7:6b:b4
    Fingerprint (SHA-256):
        AA:28:A5:7D:84:A3:CE:85:33:C7:1D:15:21:26:F0:03:0B:F1:BA:68:C9:F5:EB:76:74:04:B3:1A:5F:45:5F:A7
    Fingerprint (SHA1):
        79:2C:60:4B:C7:CF:51:AA:2B:55:50:5C:49:52:16:3B:9B:B3:1C:59


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #4595: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp       -t Root6.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp       -t Root7.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der  -t Root7.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185280 (0x1ef22380)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root7 ROOT CA,O=Root7,C=US"
        Validity:
            Not Before: Fri May 19 19:23:06 2017
            Not After : Thu May 19 19:23:06 2067
        Subject: "CN=Root7 ROOT CA,O=Root7,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e3:2b:e3:e5:71:d1:9c:9f:e1:70:28:de:ca:a8:2d:c2:
                    7e:87:2e:4a:07:5d:ff:b2:2d:43:55:57:6d:f8:01:77:
                    84:52:d6:88:9e:4a:be:d2:57:ae:2d:59:62:59:10:1f:
                    c1:06:34:88:a0:97:a4:23:31:5f:18:bc:fa:1f:3e:04:
                    d3:a4:09:2a:36:7a:dc:bb:dc:e9:ad:3a:9d:c8:f5:30:
                    8a:eb:f8:56:70:ae:fa:50:a7:76:99:58:44:88:75:86:
                    43:b1:2f:3e:8e:eb:db:c3:7e:c2:ba:9c:e1:b8:66:d3:
                    2b:3b:e2:f8:a7:6a:c0:27:ae:ba:91:e6:61:ad:48:57:
                    d4:86:ff:35:71:78:e6:2c:2d:22:9c:69:47:68:3c:24:
                    d2:70:b0:3a:1b:5a:f0:be:f4:26:85:d5:d9:ff:c9:5d:
                    7b:37:a0:79:2d:bd:74:1e:41:1a:2b:6e:e7:d5:4b:b4:
                    65:2a:20:d3:a3:cd:d4:8f:64:f4:cd:d0:75:e5:e9:e3:
                    3e:43:9f:62:3d:34:81:ee:08:92:63:ce:eb:79:a1:f8:
                    81:8d:ae:b0:9f:4b:28:f8:bc:65:9d:bb:70:b4:63:c7:
                    1e:7a:ed:50:eb:68:02:ec:c8:47:f4:e1:1e:db:cd:f7:
                    e5:93:38:2d:a6:eb:c2:05:aa:44:59:e8:e5:28:3a:5f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        21:1b:c3:f4:8d:29:cc:77:47:3a:58:13:f8:b6:8d:ef:
        6a:f2:15:79:e9:e5:49:a2:88:cf:2d:73:c9:b4:26:06:
        50:ff:5d:32:73:3d:79:4c:bc:92:cd:7a:70:05:af:c2:
        e3:41:bd:c0:c5:7d:38:99:c6:c3:d2:e2:d6:67:4d:6f:
        65:9b:d1:d6:74:53:14:cd:9e:9a:d4:e8:b7:28:b7:f1:
        99:9b:38:28:77:d1:a9:c6:2c:4e:fb:f1:26:02:ae:d5:
        9b:38:e8:b1:93:7b:de:f1:40:48:44:d8:56:e0:cb:9a:
        c0:b7:8e:56:a7:78:a0:49:d4:d2:e5:e9:94:06:10:b8:
        aa:3e:fa:b5:c8:e6:6e:eb:1d:90:4c:8d:83:1d:ac:84:
        05:22:18:2f:85:e9:01:4d:c5:92:08:f6:aa:db:fb:9f:
        db:9c:22:78:0a:57:2b:54:37:8e:35:5a:cd:dd:ca:76:
        20:a0:8a:38:6b:5e:f4:8b:1e:9a:f3:c6:6c:3f:96:70:
        22:52:d3:bb:f5:0f:8a:68:05:2d:82:60:da:d5:9e:df:
        46:3a:31:56:8f:a8:ea:55:5d:2a:b1:31:72:d9:4d:88:
        df:74:e5:d0:f9:ea:30:14:0d:93:78:69:01:2b:1e:4a:
        cd:56:6f:ab:bf:f6:29:51:c3:8f:0d:ac:47:b1:5b:2d
    Fingerprint (SHA-256):
        29:CC:38:BA:96:65:22:0C:68:5B:0F:FE:71:7A:B7:0E:91:DA:95:58:20:89:27:6B:F4:6E:08:63:C4:4A:79:8D
    Fingerprint (SHA1):
        1A:FF:20:76:DC:09:3F:50:41:4B:EB:E8:5A:F7:A1:21:42:E3:62:5C


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #4596: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp       -t Root7.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp       -t Root8.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der  -t Root8.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185281 (0x1ef22381)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root8 ROOT CA,O=Root8,C=US"
        Validity:
            Not Before: Fri May 19 19:23:14 2017
            Not After : Thu May 19 19:23:14 2067
        Subject: "CN=Root8 ROOT CA,O=Root8,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:6b:40:0c:4c:ce:53:64:20:f8:bd:57:86:57:da:a0:
                    68:78:78:6e:7e:43:a7:7a:24:91:de:bb:50:28:1d:f4:
                    dd:f7:49:73:28:0f:f6:36:f5:50:9a:b3:b2:f5:3b:6c:
                    7f:c4:e1:a0:41:5c:2a:5d:e6:b9:a7:5c:0b:b3:47:a0:
                    13:e7:fa:06:e8:f9:92:0c:3b:ab:96:83:71:84:d0:dc:
                    1b:a5:58:44:09:80:d3:fa:51:e0:c9:aa:aa:e5:b9:1a:
                    e8:0e:73:08:eb:f8:2f:68:47:78:3e:0e:1b:8b:a9:eb:
                    96:1f:f7:f8:43:b3:a6:9c:38:cc:4a:b8:d5:c7:e3:c6:
                    ef:aa:e3:2a:f1:8f:14:10:f6:39:4b:d5:f6:ac:0c:6e:
                    c4:e6:b6:07:e1:72:9f:65:e0:8b:4d:64:ba:12:f1:dd:
                    96:a3:0c:f6:38:df:2f:3f:16:aa:50:17:7f:c8:83:c5:
                    50:e1:26:8e:c6:fe:2b:55:bf:33:44:2e:ed:e2:a3:8c:
                    6d:03:78:b4:75:05:5f:97:a1:2f:89:9d:5f:9d:4c:d4:
                    27:2d:98:67:3c:22:e0:3b:56:e5:14:f9:51:b8:af:78:
                    04:7d:21:29:35:28:ac:5f:72:86:7d:19:d4:d7:9f:c1:
                    68:fb:bb:45:d6:76:74:7b:56:6a:90:3c:04:79:2e:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        28:35:9d:7c:4c:0e:65:c0:d1:b0:a8:56:34:27:c4:7b:
        c1:d7:d8:60:c0:b5:a6:0e:3e:ee:e5:fc:a2:a0:da:d6:
        3b:d0:dd:ef:91:32:95:dc:9f:9c:9b:73:80:f1:04:ac:
        64:63:30:60:01:43:c2:64:36:18:aa:93:9e:7f:06:12:
        6a:9d:3c:41:4b:32:eb:94:d4:af:a0:28:8d:e0:db:c8:
        f8:c3:f6:52:42:dc:d0:23:f6:1c:8d:45:2d:24:d5:7d:
        dc:32:18:26:d5:a6:ea:58:b0:86:a5:ec:9f:48:6f:af:
        b2:c0:02:9f:9e:6f:86:2e:15:61:59:8c:81:00:f0:5d:
        31:be:8b:c6:06:c7:fa:2e:df:ec:c6:22:ee:a3:3a:44:
        4f:e9:ae:f2:17:5d:a8:26:13:5a:2a:53:1d:6d:0c:0e:
        bc:3f:c3:83:47:47:d3:5b:db:af:d2:a0:8a:93:e6:37:
        54:2d:18:df:22:d3:8b:5f:fc:70:c2:93:32:19:b6:06:
        01:b9:19:65:2f:65:f8:51:43:be:c1:76:25:9e:9f:c3:
        10:4f:2b:8b:38:81:6c:36:00:7d:99:1a:c6:77:80:6b:
        0c:b9:ba:3f:2d:0e:f4:23:bc:6c:62:50:4e:63:22:b0:
        df:e2:fa:46:5e:c6:cb:78:39:e4:63:45:b7:5b:b3:f7
    Fingerprint (SHA-256):
        D8:90:E5:41:79:AC:D3:35:B9:DA:35:BB:2C:A5:76:B0:A6:5E:AF:41:BE:4B:D7:E5:12:A8:D3:54:0A:C2:0C:35
    Fingerprint (SHA1):
        43:93:FC:87:9C:47:3B:C8:E9:E7:31:71:AE:8D:E6:F8:04:91:6C:16


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #4597: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp       -t Root8.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp       -t Root9.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der  -t Root9.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185282 (0x1ef22382)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root9 ROOT CA,O=Root9,C=US"
        Validity:
            Not Before: Fri May 19 19:23:26 2017
            Not After : Thu May 19 19:23:26 2067
        Subject: "CN=Root9 ROOT CA,O=Root9,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:81:e7:54:33:64:c8:63:2f:d8:7d:d9:70:6a:eb:a2:
                    45:b8:5f:5e:f4:0b:e4:56:5e:d1:7c:8d:ac:dc:80:6c:
                    6f:99:2a:4a:dc:7e:c1:79:b6:6c:af:39:5b:21:90:8c:
                    33:7c:ce:bc:01:70:c7:c0:ea:8d:79:ea:05:39:54:a3:
                    ba:35:8c:7b:71:7a:18:cd:34:9f:82:cd:d7:de:c8:4a:
                    28:f9:4e:4f:9b:58:1f:b9:b3:cc:55:3c:7c:4c:f6:9b:
                    77:3e:7d:5b:28:e5:23:c5:b0:af:fd:c1:11:fc:a1:ab:
                    47:72:7c:30:0f:27:ad:0a:c4:7c:5e:63:c6:7c:55:bc:
                    e7:22:8c:6f:96:15:76:2c:76:6f:11:cb:b0:fb:4b:e3:
                    03:64:f1:4a:35:cb:e6:8e:4d:4e:48:94:ec:02:4c:18:
                    a5:78:10:48:85:2d:f8:91:1d:8e:09:b6:dc:22:a4:6c:
                    26:43:22:ee:84:ab:0c:e3:d1:4b:62:0c:6c:7d:c9:5b:
                    d0:9c:0d:f5:c5:33:ca:7d:d3:32:c6:61:af:e7:b9:4d:
                    dd:bf:ec:42:62:c0:48:34:7f:32:fa:bc:1a:f5:90:c8:
                    dd:6c:0b:0a:54:26:87:81:f0:c6:46:d3:78:8e:da:94:
                    d4:2b:48:d8:34:3e:af:9f:b1:ef:a6:da:4e:b5:35:0b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        12:32:78:87:08:86:65:a7:af:1d:38:3e:ae:ab:73:fa:
        cf:cf:b6:2b:3b:0c:6a:aa:74:80:a6:a1:f7:0f:93:0b:
        69:ce:78:fe:fa:3f:51:9d:4a:d3:12:3b:38:a1:59:a5:
        48:4a:b7:cd:de:51:2a:52:b6:c5:3b:70:f5:38:48:7e:
        58:bf:69:19:33:ba:bf:63:cb:9f:61:d0:1d:80:8f:d2:
        d9:b4:c3:a7:b1:6c:cf:e0:55:2a:09:62:f5:2d:12:5a:
        c3:48:18:97:fe:8b:25:a5:7f:6a:68:48:43:84:99:38:
        9b:3e:e5:c4:db:91:c3:2a:ac:f2:e6:2f:a8:16:e5:18:
        1a:c9:9e:75:2d:6b:35:cc:79:96:34:22:10:f7:dd:04:
        79:19:c1:a3:33:99:1d:70:65:09:0b:ac:11:4d:d4:fa:
        e4:13:d9:26:bd:8d:6a:b8:79:c1:0e:a3:fb:37:9e:07:
        76:4d:a7:49:c5:77:ad:f6:c8:c2:f8:56:93:2a:fa:47:
        ac:83:75:94:4a:c7:30:fa:8b:ab:17:cc:28:df:cc:be:
        72:1d:a8:de:54:4d:e6:a6:68:26:93:6b:3c:83:13:fc:
        51:db:3d:25:c3:71:2c:41:79:a8:f4:80:c0:a6:52:2f:
        26:43:ed:21:64:b8:1a:00:58:a8:e2:4f:49:00:9b:48
    Fingerprint (SHA-256):
        8F:E2:2A:EC:08:7A:03:52:7E:27:08:09:9D:1C:1D:BC:C8:64:6D:8B:4D:4C:84:FF:F0:B5:B0:88:F4:43:A1:60
    Fingerprint (SHA1):
        19:A9:1E:C1:58:6E:FD:C2:02:99:7E:2E:8D:A0:A4:BF:13:22:62:3A


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #4598: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp       -t Root9.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4599: Extension: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185297 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4600: Extension: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4601: Extension: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4602: Extension: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4603: Extension: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 519185298   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4604: Extension: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4605: Extension: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4606: Extension: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4607: Extension: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 519185299   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4608: Extension: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4609: Extension: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #4610: Extension: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4611: Extension: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 519185300   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4612: Extension: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4613: Extension: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4614: Extension: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185297 (0x1ef22391)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:24:44 2017
            Not After : Thu May 19 19:24:44 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:c6:bc:22:f3:57:db:e6:d8:f4:69:38:8c:a9:c3:05:
                    3e:d7:fb:b3:c4:46:cc:27:39:c7:91:27:3d:68:28:e5:
                    1f:1d:9a:f8:8b:92:23:7e:56:6a:99:9f:08:c4:f7:b0:
                    ba:41:d5:b3:50:74:76:1a:6d:41:5a:e2:4d:e9:9d:39:
                    c1:ba:d3:bb:5f:34:60:c6:15:7f:eb:6a:19:3c:65:08:
                    42:03:05:a3:40:7a:b1:54:c5:1c:f7:4b:e8:d8:b5:7f:
                    bf:d4:d1:d7:a9:79:ce:dc:53:21:39:d6:fe:6f:23:83:
                    33:87:93:9d:69:f0:b6:80:0d:29:c0:a6:4b:37:04:0d:
                    fc:39:cd:48:ca:2b:51:e1:60:50:b4:02:a3:30:ee:2a:
                    27:7e:90:6d:4c:aa:fc:0d:69:10:7d:28:e7:59:3b:8a:
                    04:07:94:8f:d6:70:7d:05:ee:71:c1:64:8e:60:a7:41:
                    6e:04:fc:c1:0f:41:a4:06:67:ba:bf:9a:de:77:45:92:
                    2e:2c:7a:81:4d:3b:c0:12:f5:d6:78:9d:8b:5c:44:be:
                    01:fc:c5:63:de:81:f3:b6:ac:8b:9e:3a:df:8e:84:ae:
                    cb:1f:68:01:a3:56:05:0e:a0:01:b6:3c:da:34:7a:e9:
                    a2:7e:75:11:c3:91:04:7b:06:62:35:95:f6:4c:f4:1f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        77:f9:16:c5:c6:12:a3:0a:88:42:54:64:0a:c6:3f:b0:
        12:97:3d:28:04:aa:93:91:16:4b:f0:95:c2:f8:11:4f:
        2a:a1:e7:f8:35:a8:17:f6:bc:86:d9:fd:cb:08:5f:60:
        cc:40:36:f2:b2:54:ea:08:95:df:ea:bf:35:0b:70:40:
        d8:01:8c:a2:90:b4:00:03:9f:77:31:52:2a:88:49:a6:
        3d:72:5d:0d:36:92:48:e2:8e:6c:f3:b9:34:f3:86:9b:
        3d:7a:57:fc:76:95:27:4f:9a:98:ae:15:95:c9:4c:d9:
        e4:e2:15:a2:c4:2d:ee:85:7c:24:9d:31:a1:36:1b:8a:
        e3:fb:dc:14:30:a1:4a:4f:f5:91:48:58:96:bf:3d:50:
        65:82:9e:56:20:e7:eb:a8:5a:cb:1d:60:5a:0c:e7:f0:
        03:a6:b9:54:05:df:6e:ba:ab:7d:09:a9:33:90:dd:99:
        de:26:49:2b:5f:2c:d2:59:23:39:12:47:8b:91:14:54:
        25:da:dd:e2:fb:06:8c:7e:9a:9b:eb:31:ae:9c:9c:73:
        84:2b:b4:3a:65:71:a9:de:9e:ec:aa:d6:d5:f3:94:1a:
        da:29:cc:1b:ec:a5:d3:04:11:d4:48:3f:3b:c9:6e:33:
        16:4f:c2:53:52:45:de:32:9c:30:2d:ed:8c:48:07:25
    Fingerprint (SHA-256):
        7D:07:DE:A9:7C:80:29:4B:62:AE:49:15:C6:90:71:3B:92:AA:CA:16:78:2A:79:B2:37:81:EA:A5:22:B4:8D:A5
    Fingerprint (SHA1):
        E4:F4:B2:51:89:D0:41:B5:35:16:12:AE:B2:62:BB:4F:19:D9:0A:78


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4615: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4616: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185298 (0x1ef22392)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:24:57 2017
            Not After : Thu May 19 19:24:57 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:81:65:ea:2e:2d:2a:09:61:c1:53:a2:3f:20:a3:db:
                    25:12:17:69:13:84:24:d8:e9:3c:dd:d0:d6:2b:a5:ed:
                    99:df:17:7e:af:ae:c7:9d:dc:ed:61:5c:b0:ea:24:81:
                    45:40:8b:c6:d3:1e:3d:f1:da:11:82:9a:7b:93:7f:c3:
                    40:be:e6:bd:4e:fa:3c:1b:33:9d:34:d5:45:ab:f8:0c:
                    76:d6:28:b3:64:fe:b5:66:4f:be:27:67:6f:b4:29:10:
                    c4:be:23:b6:3b:f8:a1:0a:95:d5:58:a3:4f:da:6f:fc:
                    f9:96:9c:a6:be:da:d2:36:6a:2c:a8:00:c9:a3:26:03:
                    98:98:62:78:fc:9a:13:00:43:9f:5b:3d:21:1f:e5:fe:
                    f1:67:a8:61:b9:94:85:49:c6:79:42:fd:c1:54:0b:e0:
                    df:4a:f0:e0:26:4b:fb:a2:d5:eb:16:57:56:64:54:f4:
                    6a:d5:ff:89:db:05:10:1b:e3:7f:29:27:be:5b:2e:f8:
                    b2:c3:2e:37:5d:16:59:c1:95:98:20:b7:76:23:0b:de:
                    b6:ca:35:49:88:ab:b7:86:63:8b:78:f8:1b:91:c1:18:
                    59:e9:bd:13:5d:fb:a6:61:48:73:c9:42:37:43:62:61:
                    83:2c:2d:52:ab:52:cc:3b:32:bf:9f:dd:5a:0c:52:9b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:64:68:4d:70:3f:d5:13:44:58:91:b2:05:25:02:e9:
        d5:6f:3f:35:76:16:62:ca:81:62:11:dc:57:a6:5e:66:
        49:f0:78:00:f4:d8:a2:b1:d4:a0:1b:32:92:3a:df:4e:
        b7:b7:d8:d1:c4:1b:19:72:52:89:d6:92:9b:57:b5:ef:
        99:f5:e5:a7:00:17:f1:fa:7e:0e:7d:fe:3f:9f:3e:30:
        8b:68:76:68:fc:8f:aa:db:3c:d3:d5:45:17:f4:5c:4c:
        93:57:21:5c:37:56:07:f0:da:2b:ff:96:07:78:af:de:
        fe:e0:78:37:c7:cb:a5:fc:74:b9:f8:2a:b1:72:8c:94:
        96:4e:d9:3a:74:98:10:ae:0d:2c:ab:c0:59:fc:00:b4:
        1e:6d:d7:e7:26:1b:8f:2b:97:0e:de:c7:27:06:91:85:
        e1:5d:e0:93:3b:9b:7a:44:8c:d5:d8:1b:a4:8c:dc:49:
        7e:2b:47:db:49:ee:54:d4:de:50:6e:e3:70:ab:f4:82:
        a4:c1:d9:9c:5d:71:0e:32:69:3e:de:0b:68:26:1e:48:
        03:b0:1d:c3:c4:55:36:50:a0:57:52:59:13:4f:4e:68:
        ec:eb:8b:f7:cc:40:86:a0:ec:d6:2e:96:0d:be:6b:79:
        d7:f1:80:42:ed:43:66:3e:71:e9:96:44:67:2b:b2:cb
    Fingerprint (SHA-256):
        76:BF:5B:D2:A3:92:E3:7D:0D:BD:DC:0A:E8:1C:10:89:F9:56:60:64:CF:F5:5C:95:DE:42:36:E6:86:2F:F2:01
    Fingerprint (SHA1):
        D6:53:5B:6E:20:83:D0:58:37:2A:2E:C3:1C:B2:F4:B1:E3:88:13:88


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4617: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4618: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185299 (0x1ef22393)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 19:25:07 2017
            Not After : Thu May 19 19:25:07 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:6d:97:ae:60:70:63:09:1f:cf:3b:b0:f9:c6:cd:c4:
                    f4:77:65:96:e4:e7:5f:17:f5:7d:a7:ff:f2:11:b2:03:
                    b3:0a:58:64:92:1c:d5:11:83:02:4c:ff:37:46:ed:c4:
                    f9:4b:6b:73:8b:da:46:d4:70:b0:23:b0:25:73:b1:37:
                    d0:e8:fc:16:1f:ac:9f:57:a2:f0:46:2e:8c:ad:26:19:
                    ea:93:c8:7d:ac:28:80:6b:7d:d5:34:2d:3b:0d:57:2d:
                    b9:5e:5d:e2:86:d4:8b:66:14:f8:9b:60:f0:92:06:44:
                    82:b5:d2:ae:ef:6c:ba:c7:da:6c:15:0f:60:58:f9:67:
                    82:d1:2a:52:47:00:7a:cf:4f:6a:1f:22:c2:0b:de:75:
                    30:52:92:4d:a7:e2:cf:10:dd:29:51:44:a9:bc:cf:7b:
                    44:1b:40:ff:6b:d3:99:68:bd:65:e9:43:79:e4:31:44:
                    2e:0b:1e:0b:0f:58:f1:41:5f:a3:a0:4e:27:5c:59:b0:
                    dc:c4:87:f1:45:61:3e:9e:13:a2:a0:8e:c2:04:d3:45:
                    4a:69:cf:ce:b6:28:d5:bb:46:11:4d:d3:07:7d:a1:bf:
                    ba:9c:89:6e:e6:50:fc:c9:14:b1:d0:f8:04:21:39:97:
                    25:a8:5f:5f:81:6c:bd:8f:76:78:9d:1f:0d:a9:cc:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        32:25:e4:95:5c:4f:af:13:70:3e:0e:7e:97:07:8d:41:
        bf:c6:dd:6a:fa:14:53:42:95:29:54:31:c4:ef:93:78:
        e0:4e:72:b4:66:79:75:04:95:2d:aa:0c:30:27:e7:c7:
        41:b1:8c:f5:18:f5:36:f3:c9:36:fc:82:02:9f:87:62:
        59:78:63:b2:36:19:83:27:f2:17:b0:df:4d:39:02:45:
        23:ce:52:a8:e3:43:16:e9:f3:21:c6:ad:04:43:24:69:
        60:a1:71:7d:e7:67:8d:1a:7e:ae:75:a6:de:04:5c:4d:
        37:32:03:e6:56:cb:44:22:f7:ff:74:44:bc:92:8a:7f:
        3b:8c:8b:55:3f:cb:75:4c:a4:15:29:d2:4d:4e:06:9f:
        cc:0d:22:80:7e:80:41:ae:b8:04:8c:a0:ec:4c:03:45:
        df:ee:60:a6:77:7e:31:a6:3e:dc:8a:5d:e7:aa:1a:e0:
        04:7d:63:af:35:6d:5f:f9:fd:27:cc:4b:2d:21:c5:f3:
        f6:a2:1c:4c:19:4e:48:63:74:81:8b:b8:44:10:c6:71:
        e5:69:72:96:ad:b8:f5:ad:1c:55:41:5e:60:28:53:80:
        41:23:41:37:ab:bc:f8:f4:b1:82:c2:53:c9:25:84:3d:
        ac:d9:35:ec:46:88:08:1e:e8:c1:57:3a:15:b8:1d:62
    Fingerprint (SHA-256):
        75:56:45:B3:CC:44:4D:FB:15:0B:7C:54:8A:E5:4A:A0:CA:2D:CA:40:05:92:6A:0C:B2:DB:6A:3C:FF:EF:32:2E
    Fingerprint (SHA1):
        E4:63:E9:48:E1:67:07:71:B7:F9:72:F4:3F:EE:8C:75:5E:DA:C7:9E


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #4619: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4620: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #4621: Extension: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #4622: Extension: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #4623: Extension: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185297 (0x1ef22391)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:24:44 2017
            Not After : Thu May 19 19:24:44 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:c6:bc:22:f3:57:db:e6:d8:f4:69:38:8c:a9:c3:05:
                    3e:d7:fb:b3:c4:46:cc:27:39:c7:91:27:3d:68:28:e5:
                    1f:1d:9a:f8:8b:92:23:7e:56:6a:99:9f:08:c4:f7:b0:
                    ba:41:d5:b3:50:74:76:1a:6d:41:5a:e2:4d:e9:9d:39:
                    c1:ba:d3:bb:5f:34:60:c6:15:7f:eb:6a:19:3c:65:08:
                    42:03:05:a3:40:7a:b1:54:c5:1c:f7:4b:e8:d8:b5:7f:
                    bf:d4:d1:d7:a9:79:ce:dc:53:21:39:d6:fe:6f:23:83:
                    33:87:93:9d:69:f0:b6:80:0d:29:c0:a6:4b:37:04:0d:
                    fc:39:cd:48:ca:2b:51:e1:60:50:b4:02:a3:30:ee:2a:
                    27:7e:90:6d:4c:aa:fc:0d:69:10:7d:28:e7:59:3b:8a:
                    04:07:94:8f:d6:70:7d:05:ee:71:c1:64:8e:60:a7:41:
                    6e:04:fc:c1:0f:41:a4:06:67:ba:bf:9a:de:77:45:92:
                    2e:2c:7a:81:4d:3b:c0:12:f5:d6:78:9d:8b:5c:44:be:
                    01:fc:c5:63:de:81:f3:b6:ac:8b:9e:3a:df:8e:84:ae:
                    cb:1f:68:01:a3:56:05:0e:a0:01:b6:3c:da:34:7a:e9:
                    a2:7e:75:11:c3:91:04:7b:06:62:35:95:f6:4c:f4:1f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        77:f9:16:c5:c6:12:a3:0a:88:42:54:64:0a:c6:3f:b0:
        12:97:3d:28:04:aa:93:91:16:4b:f0:95:c2:f8:11:4f:
        2a:a1:e7:f8:35:a8:17:f6:bc:86:d9:fd:cb:08:5f:60:
        cc:40:36:f2:b2:54:ea:08:95:df:ea:bf:35:0b:70:40:
        d8:01:8c:a2:90:b4:00:03:9f:77:31:52:2a:88:49:a6:
        3d:72:5d:0d:36:92:48:e2:8e:6c:f3:b9:34:f3:86:9b:
        3d:7a:57:fc:76:95:27:4f:9a:98:ae:15:95:c9:4c:d9:
        e4:e2:15:a2:c4:2d:ee:85:7c:24:9d:31:a1:36:1b:8a:
        e3:fb:dc:14:30:a1:4a:4f:f5:91:48:58:96:bf:3d:50:
        65:82:9e:56:20:e7:eb:a8:5a:cb:1d:60:5a:0c:e7:f0:
        03:a6:b9:54:05:df:6e:ba:ab:7d:09:a9:33:90:dd:99:
        de:26:49:2b:5f:2c:d2:59:23:39:12:47:8b:91:14:54:
        25:da:dd:e2:fb:06:8c:7e:9a:9b:eb:31:ae:9c:9c:73:
        84:2b:b4:3a:65:71:a9:de:9e:ec:aa:d6:d5:f3:94:1a:
        da:29:cc:1b:ec:a5:d3:04:11:d4:48:3f:3b:c9:6e:33:
        16:4f:c2:53:52:45:de:32:9c:30:2d:ed:8c:48:07:25
    Fingerprint (SHA-256):
        7D:07:DE:A9:7C:80:29:4B:62:AE:49:15:C6:90:71:3B:92:AA:CA:16:78:2A:79:B2:37:81:EA:A5:22:B4:8D:A5
    Fingerprint (SHA1):
        E4:F4:B2:51:89:D0:41:B5:35:16:12:AE:B2:62:BB:4F:19:D9:0A:78

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4624: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4625: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185298 (0x1ef22392)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:24:57 2017
            Not After : Thu May 19 19:24:57 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dd:81:65:ea:2e:2d:2a:09:61:c1:53:a2:3f:20:a3:db:
                    25:12:17:69:13:84:24:d8:e9:3c:dd:d0:d6:2b:a5:ed:
                    99:df:17:7e:af:ae:c7:9d:dc:ed:61:5c:b0:ea:24:81:
                    45:40:8b:c6:d3:1e:3d:f1:da:11:82:9a:7b:93:7f:c3:
                    40:be:e6:bd:4e:fa:3c:1b:33:9d:34:d5:45:ab:f8:0c:
                    76:d6:28:b3:64:fe:b5:66:4f:be:27:67:6f:b4:29:10:
                    c4:be:23:b6:3b:f8:a1:0a:95:d5:58:a3:4f:da:6f:fc:
                    f9:96:9c:a6:be:da:d2:36:6a:2c:a8:00:c9:a3:26:03:
                    98:98:62:78:fc:9a:13:00:43:9f:5b:3d:21:1f:e5:fe:
                    f1:67:a8:61:b9:94:85:49:c6:79:42:fd:c1:54:0b:e0:
                    df:4a:f0:e0:26:4b:fb:a2:d5:eb:16:57:56:64:54:f4:
                    6a:d5:ff:89:db:05:10:1b:e3:7f:29:27:be:5b:2e:f8:
                    b2:c3:2e:37:5d:16:59:c1:95:98:20:b7:76:23:0b:de:
                    b6:ca:35:49:88:ab:b7:86:63:8b:78:f8:1b:91:c1:18:
                    59:e9:bd:13:5d:fb:a6:61:48:73:c9:42:37:43:62:61:
                    83:2c:2d:52:ab:52:cc:3b:32:bf:9f:dd:5a:0c:52:9b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        1e:64:68:4d:70:3f:d5:13:44:58:91:b2:05:25:02:e9:
        d5:6f:3f:35:76:16:62:ca:81:62:11:dc:57:a6:5e:66:
        49:f0:78:00:f4:d8:a2:b1:d4:a0:1b:32:92:3a:df:4e:
        b7:b7:d8:d1:c4:1b:19:72:52:89:d6:92:9b:57:b5:ef:
        99:f5:e5:a7:00:17:f1:fa:7e:0e:7d:fe:3f:9f:3e:30:
        8b:68:76:68:fc:8f:aa:db:3c:d3:d5:45:17:f4:5c:4c:
        93:57:21:5c:37:56:07:f0:da:2b:ff:96:07:78:af:de:
        fe:e0:78:37:c7:cb:a5:fc:74:b9:f8:2a:b1:72:8c:94:
        96:4e:d9:3a:74:98:10:ae:0d:2c:ab:c0:59:fc:00:b4:
        1e:6d:d7:e7:26:1b:8f:2b:97:0e:de:c7:27:06:91:85:
        e1:5d:e0:93:3b:9b:7a:44:8c:d5:d8:1b:a4:8c:dc:49:
        7e:2b:47:db:49:ee:54:d4:de:50:6e:e3:70:ab:f4:82:
        a4:c1:d9:9c:5d:71:0e:32:69:3e:de:0b:68:26:1e:48:
        03:b0:1d:c3:c4:55:36:50:a0:57:52:59:13:4f:4e:68:
        ec:eb:8b:f7:cc:40:86:a0:ec:d6:2e:96:0d:be:6b:79:
        d7:f1:80:42:ed:43:66:3e:71:e9:96:44:67:2b:b2:cb
    Fingerprint (SHA-256):
        76:BF:5B:D2:A3:92:E3:7D:0D:BD:DC:0A:E8:1C:10:89:F9:56:60:64:CF:F5:5C:95:DE:42:36:E6:86:2F:F2:01
    Fingerprint (SHA1):
        D6:53:5B:6E:20:83:D0:58:37:2A:2E:C3:1C:B2:F4:B1:E3:88:13:88

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4626: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4627: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185299 (0x1ef22393)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 19:25:07 2017
            Not After : Thu May 19 19:25:07 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:6d:97:ae:60:70:63:09:1f:cf:3b:b0:f9:c6:cd:c4:
                    f4:77:65:96:e4:e7:5f:17:f5:7d:a7:ff:f2:11:b2:03:
                    b3:0a:58:64:92:1c:d5:11:83:02:4c:ff:37:46:ed:c4:
                    f9:4b:6b:73:8b:da:46:d4:70:b0:23:b0:25:73:b1:37:
                    d0:e8:fc:16:1f:ac:9f:57:a2:f0:46:2e:8c:ad:26:19:
                    ea:93:c8:7d:ac:28:80:6b:7d:d5:34:2d:3b:0d:57:2d:
                    b9:5e:5d:e2:86:d4:8b:66:14:f8:9b:60:f0:92:06:44:
                    82:b5:d2:ae:ef:6c:ba:c7:da:6c:15:0f:60:58:f9:67:
                    82:d1:2a:52:47:00:7a:cf:4f:6a:1f:22:c2:0b:de:75:
                    30:52:92:4d:a7:e2:cf:10:dd:29:51:44:a9:bc:cf:7b:
                    44:1b:40:ff:6b:d3:99:68:bd:65:e9:43:79:e4:31:44:
                    2e:0b:1e:0b:0f:58:f1:41:5f:a3:a0:4e:27:5c:59:b0:
                    dc:c4:87:f1:45:61:3e:9e:13:a2:a0:8e:c2:04:d3:45:
                    4a:69:cf:ce:b6:28:d5:bb:46:11:4d:d3:07:7d:a1:bf:
                    ba:9c:89:6e:e6:50:fc:c9:14:b1:d0:f8:04:21:39:97:
                    25:a8:5f:5f:81:6c:bd:8f:76:78:9d:1f:0d:a9:cc:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        32:25:e4:95:5c:4f:af:13:70:3e:0e:7e:97:07:8d:41:
        bf:c6:dd:6a:fa:14:53:42:95:29:54:31:c4:ef:93:78:
        e0:4e:72:b4:66:79:75:04:95:2d:aa:0c:30:27:e7:c7:
        41:b1:8c:f5:18:f5:36:f3:c9:36:fc:82:02:9f:87:62:
        59:78:63:b2:36:19:83:27:f2:17:b0:df:4d:39:02:45:
        23:ce:52:a8:e3:43:16:e9:f3:21:c6:ad:04:43:24:69:
        60:a1:71:7d:e7:67:8d:1a:7e:ae:75:a6:de:04:5c:4d:
        37:32:03:e6:56:cb:44:22:f7:ff:74:44:bc:92:8a:7f:
        3b:8c:8b:55:3f:cb:75:4c:a4:15:29:d2:4d:4e:06:9f:
        cc:0d:22:80:7e:80:41:ae:b8:04:8c:a0:ec:4c:03:45:
        df:ee:60:a6:77:7e:31:a6:3e:dc:8a:5d:e7:aa:1a:e0:
        04:7d:63:af:35:6d:5f:f9:fd:27:cc:4b:2d:21:c5:f3:
        f6:a2:1c:4c:19:4e:48:63:74:81:8b:b8:44:10:c6:71:
        e5:69:72:96:ad:b8:f5:ad:1c:55:41:5e:60:28:53:80:
        41:23:41:37:ab:bc:f8:f4:b1:82:c2:53:c9:25:84:3d:
        ac:d9:35:ec:46:88:08:1e:e8:c1:57:3a:15:b8:1d:62
    Fingerprint (SHA-256):
        75:56:45:B3:CC:44:4D:FB:15:0B:7C:54:8A:E5:4A:A0:CA:2D:CA:40:05:92:6A:0C:B2:DB:6A:3C:FF:EF:32:2E
    Fingerprint (SHA1):
        E4:63:E9:48:E1:67:07:71:B7:F9:72:F4:3F:EE:8C:75:5E:DA:C7:9E

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #4628: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.2.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4629: Extension: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4630: Extension2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185301 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4631: Extension2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4632: Extension2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4633: Extension2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4634: Extension2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 519185302   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4635: Extension2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4636: Extension2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4637: Extension2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4638: Extension2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 519185303   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4639: Extension2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4640: Extension2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #4641: Extension2: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o User1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4642: Extension2: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 519185304   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4643: Extension2: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4644: Extension2: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #4645: Extension2: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o User2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4646: Extension2: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 519185305   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4647: Extension2: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4648: Extension2: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4649: Extension2: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185301 (0x1ef22395)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:25:34 2017
            Not After : Thu May 19 19:25:34 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:65:4f:2c:a6:e5:57:68:fd:51:75:5a:4d:43:61:55:
                    61:48:dd:f7:8a:3a:8b:e1:81:20:c9:85:5d:48:f5:18:
                    03:62:6b:b1:33:e5:47:ca:6b:6f:fb:5b:59:8b:10:05:
                    5f:4c:98:cc:61:cc:e1:e8:80:5f:8f:2e:8c:4e:41:f8:
                    51:03:ad:95:66:ca:ed:8d:7e:85:6d:51:58:84:56:3d:
                    2d:e8:cb:b4:76:57:4b:48:02:de:c9:4f:15:de:cc:a3:
                    5b:4b:d5:b2:34:47:5e:b8:39:ba:fc:d0:2f:07:c2:5f:
                    6d:f2:f2:bc:95:94:da:ad:09:d1:1a:97:a5:61:43:20:
                    b3:0e:4c:4d:a2:33:97:3d:a1:34:fb:83:51:80:ba:f5:
                    d4:0c:84:a2:ed:3e:76:e4:ef:2a:68:50:56:2a:e1:a9:
                    70:ec:5b:09:5a:6c:cf:f9:d7:14:3f:30:57:f4:1c:79:
                    ab:44:c7:26:9e:d1:01:2e:d3:16:30:b7:19:64:e3:06:
                    07:8e:3e:e7:e9:ed:0a:dc:14:6b:39:dc:a0:09:8e:f1:
                    06:07:d9:cd:75:19:1a:a9:35:fb:c4:68:26:df:3d:b6:
                    b0:26:72:a7:86:03:fe:42:17:e8:b8:ea:52:e8:ca:bd:
                    f4:ac:f1:dd:dd:0d:ae:1e:b3:5c:19:8f:88:f1:8d:89
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        81:06:9b:ba:78:f1:ae:28:c6:f4:4c:8b:7d:bf:38:4a:
        3b:7b:6a:83:45:5f:bd:f1:39:1b:da:0e:84:92:5d:34:
        18:c5:3e:23:a0:43:4c:b1:1d:5e:e0:c5:20:65:ef:99:
        45:28:58:99:ec:ad:ee:8c:fb:c6:8b:b2:ce:90:ef:11:
        0d:de:18:97:fb:0d:30:d6:c4:0a:0d:20:24:90:8b:85:
        51:7b:97:6a:02:57:98:20:23:0f:57:7e:c2:c7:ef:36:
        44:10:10:01:15:56:c3:b7:a7:0b:d0:8a:8d:fc:c5:dc:
        3c:ac:96:e4:74:44:d8:f4:d0:85:f4:1f:8a:a1:75:9e:
        a3:12:29:d4:ec:80:b8:53:03:5f:7c:c0:28:93:67:a1:
        59:56:df:61:41:2f:96:2f:ee:80:6f:3f:a0:a6:ce:9f:
        f5:4d:9f:ce:0c:85:a9:4b:47:42:0b:33:29:df:d4:d5:
        f0:65:5a:c4:df:49:4f:69:f0:a1:0a:d7:9d:9f:93:c2:
        30:b8:82:d5:e8:41:f9:42:06:75:c2:b7:a8:ba:2e:a4:
        dd:9c:60:65:e8:16:cc:6e:1a:4d:83:68:07:fe:12:62:
        4b:91:67:f5:c8:d7:eb:ea:1e:b2:8c:d3:4e:3e:84:e3:
        a3:c1:65:fb:f5:aa:c7:4c:3b:12:af:a0:22:a6:42:d9
    Fingerprint (SHA-256):
        A1:82:38:6A:26:9D:BC:06:73:5E:A2:BA:10:C9:37:B5:16:65:BC:7A:F3:11:D6:81:D5:8C:AA:2A:31:3C:6B:AE
    Fingerprint (SHA1):
        95:7A:56:3D:9E:BC:B0:C3:5E:26:36:AE:17:E1:DC:72:C9:D0:0C:9B


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4650: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4651: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp      -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185302 (0x1ef22396)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:25:41 2017
            Not After : Thu May 19 19:25:41 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c9:2d:86:e3:48:c2:db:d5:9c:a2:14:0c:65:65:67:ec:
                    3c:e2:71:41:c4:06:8d:51:1d:9a:28:bb:4c:65:8c:9a:
                    01:ad:9a:78:f3:a6:af:58:56:60:85:06:5a:48:b8:cf:
                    0d:d1:da:00:de:43:5c:16:c8:b7:db:12:a0:d9:35:55:
                    82:4e:bb:13:d3:0c:6d:1d:6f:97:9d:62:91:94:27:7f:
                    ea:dc:f4:43:52:e6:8c:70:fd:c2:03:34:61:0a:b2:db:
                    7c:88:09:5a:96:ea:47:67:f2:66:2d:74:e0:b5:86:7a:
                    73:8d:67:53:25:8a:ef:bc:97:42:6f:8a:22:e0:82:c7:
                    97:81:7a:8a:84:eb:fc:55:85:89:0a:cf:90:c7:d0:a0:
                    27:08:35:fb:cb:3a:64:95:bd:93:6e:2f:31:d1:25:9b:
                    eb:0e:d5:18:bb:4f:4b:61:40:d4:fa:46:a1:93:00:a9:
                    bc:51:0d:47:52:51:ee:e1:44:a0:f5:6f:29:ee:f1:64:
                    78:2d:b0:66:4e:97:81:d7:e7:7b:9e:36:55:72:52:46:
                    85:0b:9d:82:0e:76:1f:35:f4:14:56:02:d6:c8:27:53:
                    88:a2:21:38:81:73:9a:72:ea:25:94:3d:c1:98:1b:90:
                    6f:d7:9c:1a:96:2c:40:41:77:bd:8e:00:75:4b:2c:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        06:31:2f:f4:79:de:c7:fd:7d:95:31:8d:e5:b4:f3:03:
        c4:21:49:7d:9e:97:76:3b:f2:cf:c6:d2:3c:d0:a7:8f:
        31:7b:24:73:8c:e0:e7:e4:78:f4:ad:12:c4:e5:f7:48:
        c2:01:da:5d:cb:9c:5e:9e:ed:f7:43:53:7d:dd:c0:be:
        f3:27:b9:83:4a:36:68:c7:cb:ea:6c:05:19:62:b8:21:
        df:7d:0d:94:cf:26:5f:39:c6:2d:a9:89:e5:de:38:d5:
        16:68:4f:96:87:65:63:1e:9c:d9:98:77:7b:a6:1a:71:
        54:17:70:79:a0:47:2c:ad:10:aa:31:c9:5e:a6:50:c3:
        22:30:52:44:06:c0:78:c8:7d:63:b4:48:c2:a8:fa:94:
        96:12:7e:bd:3b:e8:2c:64:3e:12:a5:c7:f8:59:7e:95:
        f2:8b:d7:84:c6:40:11:5b:ca:14:76:66:5f:eb:23:ee:
        5e:dd:f4:4f:57:2e:1f:97:b9:f5:4a:90:3a:fa:46:97:
        ea:cf:8f:ce:fa:68:b9:bd:f3:a6:40:57:85:72:bf:6b:
        e8:c3:de:ca:1c:dc:34:4b:da:33:00:ec:68:61:86:f4:
        87:2d:ff:8c:6c:b9:c7:f3:81:46:a0:83:80:1c:ad:61:
        16:45:4c:f7:70:59:68:53:f4:18:d8:1f:4b:5a:15:57
    Fingerprint (SHA-256):
        6C:E5:8F:09:8A:A0:10:8C:7F:0E:9F:12:02:DC:A0:79:3E:8C:CC:69:8B:9E:81:82:F6:00:BD:BE:DC:F1:5F:73
    Fingerprint (SHA1):
        A2:93:12:A4:45:FE:71:0D:0A:E1:99:E4:41:F1:77:0E:5B:18:9E:31


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4652: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4653: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp      -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185303 (0x1ef22397)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 19:25:48 2017
            Not After : Thu May 19 19:25:48 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:07:92:ef:d2:04:32:46:73:bb:b2:6e:6b:07:17:b5:
                    8c:fa:71:67:15:fb:5e:82:9b:bb:92:4d:90:ee:53:53:
                    08:29:27:1b:85:28:d4:3e:cf:c8:8b:c0:a9:d7:1f:c0:
                    22:f0:41:d2:f6:cd:41:e6:c3:af:39:de:23:a1:22:77:
                    8e:c3:53:54:a7:d8:37:3e:6e:10:e0:41:25:41:37:cf:
                    37:64:b7:2f:17:1a:4c:ab:52:dc:1d:c8:58:74:fa:a4:
                    03:41:3f:b2:ed:ee:05:40:2b:f9:6f:9d:d3:d7:f2:cf:
                    00:4e:da:f8:28:f6:12:ee:3c:1a:ff:dc:df:a2:ab:51:
                    f8:b3:15:c3:33:1c:4d:7f:a7:e6:94:b5:eb:8b:fe:e1:
                    0e:df:ea:1b:38:50:d7:3b:69:9e:81:3e:5c:b0:a9:86:
                    18:5b:a4:c4:55:94:7d:46:ae:5f:be:f9:52:a6:1d:cf:
                    14:cb:89:aa:f4:6a:46:6c:62:e0:8b:89:1d:7f:e1:b9:
                    81:c4:7a:e9:39:32:55:6a:bf:b3:6b:fd:da:ca:4a:f9:
                    e3:c1:db:a8:d4:5e:04:6c:28:fb:4b:a5:26:83:70:f8:
                    a1:39:c3:95:b7:cd:f5:65:62:e7:d4:08:a0:a3:b2:78:
                    2d:96:c8:69:ef:aa:56:3c:76:e8:73:27:25:bc:56:29
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        bd:55:ae:1b:8f:cb:9d:53:89:95:5c:1d:64:4d:f6:19:
        b0:3d:7b:34:13:49:16:83:13:f1:87:1e:0d:68:81:54:
        84:fd:5b:54:a2:6c:d9:31:48:16:1f:13:3d:91:01:77:
        5d:9a:da:c2:40:e0:f8:3a:df:2f:b4:ec:00:1c:be:3c:
        a4:b1:35:99:93:4f:5a:41:78:6f:b6:77:dd:43:e3:1e:
        f0:82:48:aa:64:9c:bc:11:c1:99:4f:b0:2f:c9:cd:0d:
        11:93:97:5e:41:79:d2:c6:0b:8b:a8:31:1b:f8:e9:76:
        17:dd:fb:d3:f0:c2:49:c7:d7:26:0d:72:51:ad:1f:95:
        5f:3c:8e:ac:cf:ae:e8:9f:2f:93:0d:1f:25:b3:a1:dc:
        ce:bd:f4:74:f3:72:86:90:00:85:25:40:61:a1:c0:77:
        f2:94:8f:19:e7:7c:ce:92:be:4f:89:9d:66:bc:7e:3a:
        8e:0d:e6:31:53:0f:bb:f9:84:29:1b:b7:9d:ce:90:2e:
        93:3a:e1:b0:fb:60:ae:3e:93:39:4c:4a:03:a9:bb:87:
        5b:be:6e:f3:2c:53:88:ae:38:95:31:96:bd:7c:9a:d6:
        75:32:60:8f:cd:e9:5a:ae:cb:d3:fe:dd:5a:0b:85:ab:
        83:e5:bf:0a:9e:6e:94:40:75:1c:31:a2:b6:f5:78:ac
    Fingerprint (SHA-256):
        A7:BC:AC:FA:B4:1A:87:AA:03:AE:D1:51:74:C6:CE:FD:56:0D:80:BA:80:79:D2:47:14:04:6F:0C:62:D7:F9:6C
    Fingerprint (SHA1):
        1A:4A:C5:8D:1D:3A:12:B4:66:C3:DB:55:3B:0A:C4:CE:59:A8:70:91


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4654: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4655: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags -d AllDB -pp      -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #4656: Extension2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #4657: Extension2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #4658: Extension2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185301 (0x1ef22395)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:25:34 2017
            Not After : Thu May 19 19:25:34 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:65:4f:2c:a6:e5:57:68:fd:51:75:5a:4d:43:61:55:
                    61:48:dd:f7:8a:3a:8b:e1:81:20:c9:85:5d:48:f5:18:
                    03:62:6b:b1:33:e5:47:ca:6b:6f:fb:5b:59:8b:10:05:
                    5f:4c:98:cc:61:cc:e1:e8:80:5f:8f:2e:8c:4e:41:f8:
                    51:03:ad:95:66:ca:ed:8d:7e:85:6d:51:58:84:56:3d:
                    2d:e8:cb:b4:76:57:4b:48:02:de:c9:4f:15:de:cc:a3:
                    5b:4b:d5:b2:34:47:5e:b8:39:ba:fc:d0:2f:07:c2:5f:
                    6d:f2:f2:bc:95:94:da:ad:09:d1:1a:97:a5:61:43:20:
                    b3:0e:4c:4d:a2:33:97:3d:a1:34:fb:83:51:80:ba:f5:
                    d4:0c:84:a2:ed:3e:76:e4:ef:2a:68:50:56:2a:e1:a9:
                    70:ec:5b:09:5a:6c:cf:f9:d7:14:3f:30:57:f4:1c:79:
                    ab:44:c7:26:9e:d1:01:2e:d3:16:30:b7:19:64:e3:06:
                    07:8e:3e:e7:e9:ed:0a:dc:14:6b:39:dc:a0:09:8e:f1:
                    06:07:d9:cd:75:19:1a:a9:35:fb:c4:68:26:df:3d:b6:
                    b0:26:72:a7:86:03:fe:42:17:e8:b8:ea:52:e8:ca:bd:
                    f4:ac:f1:dd:dd:0d:ae:1e:b3:5c:19:8f:88:f1:8d:89
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        81:06:9b:ba:78:f1:ae:28:c6:f4:4c:8b:7d:bf:38:4a:
        3b:7b:6a:83:45:5f:bd:f1:39:1b:da:0e:84:92:5d:34:
        18:c5:3e:23:a0:43:4c:b1:1d:5e:e0:c5:20:65:ef:99:
        45:28:58:99:ec:ad:ee:8c:fb:c6:8b:b2:ce:90:ef:11:
        0d:de:18:97:fb:0d:30:d6:c4:0a:0d:20:24:90:8b:85:
        51:7b:97:6a:02:57:98:20:23:0f:57:7e:c2:c7:ef:36:
        44:10:10:01:15:56:c3:b7:a7:0b:d0:8a:8d:fc:c5:dc:
        3c:ac:96:e4:74:44:d8:f4:d0:85:f4:1f:8a:a1:75:9e:
        a3:12:29:d4:ec:80:b8:53:03:5f:7c:c0:28:93:67:a1:
        59:56:df:61:41:2f:96:2f:ee:80:6f:3f:a0:a6:ce:9f:
        f5:4d:9f:ce:0c:85:a9:4b:47:42:0b:33:29:df:d4:d5:
        f0:65:5a:c4:df:49:4f:69:f0:a1:0a:d7:9d:9f:93:c2:
        30:b8:82:d5:e8:41:f9:42:06:75:c2:b7:a8:ba:2e:a4:
        dd:9c:60:65:e8:16:cc:6e:1a:4d:83:68:07:fe:12:62:
        4b:91:67:f5:c8:d7:eb:ea:1e:b2:8c:d3:4e:3e:84:e3:
        a3:c1:65:fb:f5:aa:c7:4c:3b:12:af:a0:22:a6:42:d9
    Fingerprint (SHA-256):
        A1:82:38:6A:26:9D:BC:06:73:5E:A2:BA:10:C9:37:B5:16:65:BC:7A:F3:11:D6:81:D5:8C:AA:2A:31:3C:6B:AE
    Fingerprint (SHA1):
        95:7A:56:3D:9E:BC:B0:C3:5E:26:36:AE:17:E1:DC:72:C9:D0:0C:9B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4659: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4660: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185302 (0x1ef22396)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:25:41 2017
            Not After : Thu May 19 19:25:41 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c9:2d:86:e3:48:c2:db:d5:9c:a2:14:0c:65:65:67:ec:
                    3c:e2:71:41:c4:06:8d:51:1d:9a:28:bb:4c:65:8c:9a:
                    01:ad:9a:78:f3:a6:af:58:56:60:85:06:5a:48:b8:cf:
                    0d:d1:da:00:de:43:5c:16:c8:b7:db:12:a0:d9:35:55:
                    82:4e:bb:13:d3:0c:6d:1d:6f:97:9d:62:91:94:27:7f:
                    ea:dc:f4:43:52:e6:8c:70:fd:c2:03:34:61:0a:b2:db:
                    7c:88:09:5a:96:ea:47:67:f2:66:2d:74:e0:b5:86:7a:
                    73:8d:67:53:25:8a:ef:bc:97:42:6f:8a:22:e0:82:c7:
                    97:81:7a:8a:84:eb:fc:55:85:89:0a:cf:90:c7:d0:a0:
                    27:08:35:fb:cb:3a:64:95:bd:93:6e:2f:31:d1:25:9b:
                    eb:0e:d5:18:bb:4f:4b:61:40:d4:fa:46:a1:93:00:a9:
                    bc:51:0d:47:52:51:ee:e1:44:a0:f5:6f:29:ee:f1:64:
                    78:2d:b0:66:4e:97:81:d7:e7:7b:9e:36:55:72:52:46:
                    85:0b:9d:82:0e:76:1f:35:f4:14:56:02:d6:c8:27:53:
                    88:a2:21:38:81:73:9a:72:ea:25:94:3d:c1:98:1b:90:
                    6f:d7:9c:1a:96:2c:40:41:77:bd:8e:00:75:4b:2c:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        06:31:2f:f4:79:de:c7:fd:7d:95:31:8d:e5:b4:f3:03:
        c4:21:49:7d:9e:97:76:3b:f2:cf:c6:d2:3c:d0:a7:8f:
        31:7b:24:73:8c:e0:e7:e4:78:f4:ad:12:c4:e5:f7:48:
        c2:01:da:5d:cb:9c:5e:9e:ed:f7:43:53:7d:dd:c0:be:
        f3:27:b9:83:4a:36:68:c7:cb:ea:6c:05:19:62:b8:21:
        df:7d:0d:94:cf:26:5f:39:c6:2d:a9:89:e5:de:38:d5:
        16:68:4f:96:87:65:63:1e:9c:d9:98:77:7b:a6:1a:71:
        54:17:70:79:a0:47:2c:ad:10:aa:31:c9:5e:a6:50:c3:
        22:30:52:44:06:c0:78:c8:7d:63:b4:48:c2:a8:fa:94:
        96:12:7e:bd:3b:e8:2c:64:3e:12:a5:c7:f8:59:7e:95:
        f2:8b:d7:84:c6:40:11:5b:ca:14:76:66:5f:eb:23:ee:
        5e:dd:f4:4f:57:2e:1f:97:b9:f5:4a:90:3a:fa:46:97:
        ea:cf:8f:ce:fa:68:b9:bd:f3:a6:40:57:85:72:bf:6b:
        e8:c3:de:ca:1c:dc:34:4b:da:33:00:ec:68:61:86:f4:
        87:2d:ff:8c:6c:b9:c7:f3:81:46:a0:83:80:1c:ad:61:
        16:45:4c:f7:70:59:68:53:f4:18:d8:1f:4b:5a:15:57
    Fingerprint (SHA-256):
        6C:E5:8F:09:8A:A0:10:8C:7F:0E:9F:12:02:DC:A0:79:3E:8C:CC:69:8B:9E:81:82:F6:00:BD:BE:DC:F1:5F:73
    Fingerprint (SHA1):
        A2:93:12:A4:45:FE:71:0D:0A:E1:99:E4:41:F1:77:0E:5B:18:9E:31

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4661: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4662: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185303 (0x1ef22397)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 19:25:48 2017
            Not After : Thu May 19 19:25:48 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:07:92:ef:d2:04:32:46:73:bb:b2:6e:6b:07:17:b5:
                    8c:fa:71:67:15:fb:5e:82:9b:bb:92:4d:90:ee:53:53:
                    08:29:27:1b:85:28:d4:3e:cf:c8:8b:c0:a9:d7:1f:c0:
                    22:f0:41:d2:f6:cd:41:e6:c3:af:39:de:23:a1:22:77:
                    8e:c3:53:54:a7:d8:37:3e:6e:10:e0:41:25:41:37:cf:
                    37:64:b7:2f:17:1a:4c:ab:52:dc:1d:c8:58:74:fa:a4:
                    03:41:3f:b2:ed:ee:05:40:2b:f9:6f:9d:d3:d7:f2:cf:
                    00:4e:da:f8:28:f6:12:ee:3c:1a:ff:dc:df:a2:ab:51:
                    f8:b3:15:c3:33:1c:4d:7f:a7:e6:94:b5:eb:8b:fe:e1:
                    0e:df:ea:1b:38:50:d7:3b:69:9e:81:3e:5c:b0:a9:86:
                    18:5b:a4:c4:55:94:7d:46:ae:5f:be:f9:52:a6:1d:cf:
                    14:cb:89:aa:f4:6a:46:6c:62:e0:8b:89:1d:7f:e1:b9:
                    81:c4:7a:e9:39:32:55:6a:bf:b3:6b:fd:da:ca:4a:f9:
                    e3:c1:db:a8:d4:5e:04:6c:28:fb:4b:a5:26:83:70:f8:
                    a1:39:c3:95:b7:cd:f5:65:62:e7:d4:08:a0:a3:b2:78:
                    2d:96:c8:69:ef:aa:56:3c:76:e8:73:27:25:bc:56:29
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        bd:55:ae:1b:8f:cb:9d:53:89:95:5c:1d:64:4d:f6:19:
        b0:3d:7b:34:13:49:16:83:13:f1:87:1e:0d:68:81:54:
        84:fd:5b:54:a2:6c:d9:31:48:16:1f:13:3d:91:01:77:
        5d:9a:da:c2:40:e0:f8:3a:df:2f:b4:ec:00:1c:be:3c:
        a4:b1:35:99:93:4f:5a:41:78:6f:b6:77:dd:43:e3:1e:
        f0:82:48:aa:64:9c:bc:11:c1:99:4f:b0:2f:c9:cd:0d:
        11:93:97:5e:41:79:d2:c6:0b:8b:a8:31:1b:f8:e9:76:
        17:dd:fb:d3:f0:c2:49:c7:d7:26:0d:72:51:ad:1f:95:
        5f:3c:8e:ac:cf:ae:e8:9f:2f:93:0d:1f:25:b3:a1:dc:
        ce:bd:f4:74:f3:72:86:90:00:85:25:40:61:a1:c0:77:
        f2:94:8f:19:e7:7c:ce:92:be:4f:89:9d:66:bc:7e:3a:
        8e:0d:e6:31:53:0f:bb:f9:84:29:1b:b7:9d:ce:90:2e:
        93:3a:e1:b0:fb:60:ae:3e:93:39:4c:4a:03:a9:bb:87:
        5b:be:6e:f3:2c:53:88:ae:38:95:31:96:bd:7c:9a:d6:
        75:32:60:8f:cd:e9:5a:ae:cb:d3:fe:dd:5a:0b:85:ab:
        83:e5:bf:0a:9e:6e:94:40:75:1c:31:a2:b6:f5:78:ac
    Fingerprint (SHA-256):
        A7:BC:AC:FA:B4:1A:87:AA:03:AE:D1:51:74:C6:CE:FD:56:0D:80:BA:80:79:D2:47:14:04:6F:0C:62:D7:F9:6C
    Fingerprint (SHA1):
        1A:4A:C5:8D:1D:3A:12:B4:66:C3:DB:55:3B:0A:C4:CE:59:A8:70:91

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4663: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4664: Extension2: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185301 (0x1ef22395)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:25:34 2017
            Not After : Thu May 19 19:25:34 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:65:4f:2c:a6:e5:57:68:fd:51:75:5a:4d:43:61:55:
                    61:48:dd:f7:8a:3a:8b:e1:81:20:c9:85:5d:48:f5:18:
                    03:62:6b:b1:33:e5:47:ca:6b:6f:fb:5b:59:8b:10:05:
                    5f:4c:98:cc:61:cc:e1:e8:80:5f:8f:2e:8c:4e:41:f8:
                    51:03:ad:95:66:ca:ed:8d:7e:85:6d:51:58:84:56:3d:
                    2d:e8:cb:b4:76:57:4b:48:02:de:c9:4f:15:de:cc:a3:
                    5b:4b:d5:b2:34:47:5e:b8:39:ba:fc:d0:2f:07:c2:5f:
                    6d:f2:f2:bc:95:94:da:ad:09:d1:1a:97:a5:61:43:20:
                    b3:0e:4c:4d:a2:33:97:3d:a1:34:fb:83:51:80:ba:f5:
                    d4:0c:84:a2:ed:3e:76:e4:ef:2a:68:50:56:2a:e1:a9:
                    70:ec:5b:09:5a:6c:cf:f9:d7:14:3f:30:57:f4:1c:79:
                    ab:44:c7:26:9e:d1:01:2e:d3:16:30:b7:19:64:e3:06:
                    07:8e:3e:e7:e9:ed:0a:dc:14:6b:39:dc:a0:09:8e:f1:
                    06:07:d9:cd:75:19:1a:a9:35:fb:c4:68:26:df:3d:b6:
                    b0:26:72:a7:86:03:fe:42:17:e8:b8:ea:52:e8:ca:bd:
                    f4:ac:f1:dd:dd:0d:ae:1e:b3:5c:19:8f:88:f1:8d:89
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        81:06:9b:ba:78:f1:ae:28:c6:f4:4c:8b:7d:bf:38:4a:
        3b:7b:6a:83:45:5f:bd:f1:39:1b:da:0e:84:92:5d:34:
        18:c5:3e:23:a0:43:4c:b1:1d:5e:e0:c5:20:65:ef:99:
        45:28:58:99:ec:ad:ee:8c:fb:c6:8b:b2:ce:90:ef:11:
        0d:de:18:97:fb:0d:30:d6:c4:0a:0d:20:24:90:8b:85:
        51:7b:97:6a:02:57:98:20:23:0f:57:7e:c2:c7:ef:36:
        44:10:10:01:15:56:c3:b7:a7:0b:d0:8a:8d:fc:c5:dc:
        3c:ac:96:e4:74:44:d8:f4:d0:85:f4:1f:8a:a1:75:9e:
        a3:12:29:d4:ec:80:b8:53:03:5f:7c:c0:28:93:67:a1:
        59:56:df:61:41:2f:96:2f:ee:80:6f:3f:a0:a6:ce:9f:
        f5:4d:9f:ce:0c:85:a9:4b:47:42:0b:33:29:df:d4:d5:
        f0:65:5a:c4:df:49:4f:69:f0:a1:0a:d7:9d:9f:93:c2:
        30:b8:82:d5:e8:41:f9:42:06:75:c2:b7:a8:ba:2e:a4:
        dd:9c:60:65:e8:16:cc:6e:1a:4d:83:68:07:fe:12:62:
        4b:91:67:f5:c8:d7:eb:ea:1e:b2:8c:d3:4e:3e:84:e3:
        a3:c1:65:fb:f5:aa:c7:4c:3b:12:af:a0:22:a6:42:d9
    Fingerprint (SHA-256):
        A1:82:38:6A:26:9D:BC:06:73:5E:A2:BA:10:C9:37:B5:16:65:BC:7A:F3:11:D6:81:D5:8C:AA:2A:31:3C:6B:AE
    Fingerprint (SHA1):
        95:7A:56:3D:9E:BC:B0:C3:5E:26:36:AE:17:E1:DC:72:C9:D0:0C:9B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4665: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185301 (0x1ef22395)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:25:34 2017
            Not After : Thu May 19 19:25:34 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:65:4f:2c:a6:e5:57:68:fd:51:75:5a:4d:43:61:55:
                    61:48:dd:f7:8a:3a:8b:e1:81:20:c9:85:5d:48:f5:18:
                    03:62:6b:b1:33:e5:47:ca:6b:6f:fb:5b:59:8b:10:05:
                    5f:4c:98:cc:61:cc:e1:e8:80:5f:8f:2e:8c:4e:41:f8:
                    51:03:ad:95:66:ca:ed:8d:7e:85:6d:51:58:84:56:3d:
                    2d:e8:cb:b4:76:57:4b:48:02:de:c9:4f:15:de:cc:a3:
                    5b:4b:d5:b2:34:47:5e:b8:39:ba:fc:d0:2f:07:c2:5f:
                    6d:f2:f2:bc:95:94:da:ad:09:d1:1a:97:a5:61:43:20:
                    b3:0e:4c:4d:a2:33:97:3d:a1:34:fb:83:51:80:ba:f5:
                    d4:0c:84:a2:ed:3e:76:e4:ef:2a:68:50:56:2a:e1:a9:
                    70:ec:5b:09:5a:6c:cf:f9:d7:14:3f:30:57:f4:1c:79:
                    ab:44:c7:26:9e:d1:01:2e:d3:16:30:b7:19:64:e3:06:
                    07:8e:3e:e7:e9:ed:0a:dc:14:6b:39:dc:a0:09:8e:f1:
                    06:07:d9:cd:75:19:1a:a9:35:fb:c4:68:26:df:3d:b6:
                    b0:26:72:a7:86:03:fe:42:17:e8:b8:ea:52:e8:ca:bd:
                    f4:ac:f1:dd:dd:0d:ae:1e:b3:5c:19:8f:88:f1:8d:89
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        81:06:9b:ba:78:f1:ae:28:c6:f4:4c:8b:7d:bf:38:4a:
        3b:7b:6a:83:45:5f:bd:f1:39:1b:da:0e:84:92:5d:34:
        18:c5:3e:23:a0:43:4c:b1:1d:5e:e0:c5:20:65:ef:99:
        45:28:58:99:ec:ad:ee:8c:fb:c6:8b:b2:ce:90:ef:11:
        0d:de:18:97:fb:0d:30:d6:c4:0a:0d:20:24:90:8b:85:
        51:7b:97:6a:02:57:98:20:23:0f:57:7e:c2:c7:ef:36:
        44:10:10:01:15:56:c3:b7:a7:0b:d0:8a:8d:fc:c5:dc:
        3c:ac:96:e4:74:44:d8:f4:d0:85:f4:1f:8a:a1:75:9e:
        a3:12:29:d4:ec:80:b8:53:03:5f:7c:c0:28:93:67:a1:
        59:56:df:61:41:2f:96:2f:ee:80:6f:3f:a0:a6:ce:9f:
        f5:4d:9f:ce:0c:85:a9:4b:47:42:0b:33:29:df:d4:d5:
        f0:65:5a:c4:df:49:4f:69:f0:a1:0a:d7:9d:9f:93:c2:
        30:b8:82:d5:e8:41:f9:42:06:75:c2:b7:a8:ba:2e:a4:
        dd:9c:60:65:e8:16:cc:6e:1a:4d:83:68:07:fe:12:62:
        4b:91:67:f5:c8:d7:eb:ea:1e:b2:8c:d3:4e:3e:84:e3:
        a3:c1:65:fb:f5:aa:c7:4c:3b:12:af:a0:22:a6:42:d9
    Fingerprint (SHA-256):
        A1:82:38:6A:26:9D:BC:06:73:5E:A2:BA:10:C9:37:B5:16:65:BC:7A:F3:11:D6:81:D5:8C:AA:2A:31:3C:6B:AE
    Fingerprint (SHA1):
        95:7A:56:3D:9E:BC:B0:C3:5E:26:36:AE:17:E1:DC:72:C9:D0:0C:9B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4666: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185302 (0x1ef22396)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:25:41 2017
            Not After : Thu May 19 19:25:41 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c9:2d:86:e3:48:c2:db:d5:9c:a2:14:0c:65:65:67:ec:
                    3c:e2:71:41:c4:06:8d:51:1d:9a:28:bb:4c:65:8c:9a:
                    01:ad:9a:78:f3:a6:af:58:56:60:85:06:5a:48:b8:cf:
                    0d:d1:da:00:de:43:5c:16:c8:b7:db:12:a0:d9:35:55:
                    82:4e:bb:13:d3:0c:6d:1d:6f:97:9d:62:91:94:27:7f:
                    ea:dc:f4:43:52:e6:8c:70:fd:c2:03:34:61:0a:b2:db:
                    7c:88:09:5a:96:ea:47:67:f2:66:2d:74:e0:b5:86:7a:
                    73:8d:67:53:25:8a:ef:bc:97:42:6f:8a:22:e0:82:c7:
                    97:81:7a:8a:84:eb:fc:55:85:89:0a:cf:90:c7:d0:a0:
                    27:08:35:fb:cb:3a:64:95:bd:93:6e:2f:31:d1:25:9b:
                    eb:0e:d5:18:bb:4f:4b:61:40:d4:fa:46:a1:93:00:a9:
                    bc:51:0d:47:52:51:ee:e1:44:a0:f5:6f:29:ee:f1:64:
                    78:2d:b0:66:4e:97:81:d7:e7:7b:9e:36:55:72:52:46:
                    85:0b:9d:82:0e:76:1f:35:f4:14:56:02:d6:c8:27:53:
                    88:a2:21:38:81:73:9a:72:ea:25:94:3d:c1:98:1b:90:
                    6f:d7:9c:1a:96:2c:40:41:77:bd:8e:00:75:4b:2c:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        06:31:2f:f4:79:de:c7:fd:7d:95:31:8d:e5:b4:f3:03:
        c4:21:49:7d:9e:97:76:3b:f2:cf:c6:d2:3c:d0:a7:8f:
        31:7b:24:73:8c:e0:e7:e4:78:f4:ad:12:c4:e5:f7:48:
        c2:01:da:5d:cb:9c:5e:9e:ed:f7:43:53:7d:dd:c0:be:
        f3:27:b9:83:4a:36:68:c7:cb:ea:6c:05:19:62:b8:21:
        df:7d:0d:94:cf:26:5f:39:c6:2d:a9:89:e5:de:38:d5:
        16:68:4f:96:87:65:63:1e:9c:d9:98:77:7b:a6:1a:71:
        54:17:70:79:a0:47:2c:ad:10:aa:31:c9:5e:a6:50:c3:
        22:30:52:44:06:c0:78:c8:7d:63:b4:48:c2:a8:fa:94:
        96:12:7e:bd:3b:e8:2c:64:3e:12:a5:c7:f8:59:7e:95:
        f2:8b:d7:84:c6:40:11:5b:ca:14:76:66:5f:eb:23:ee:
        5e:dd:f4:4f:57:2e:1f:97:b9:f5:4a:90:3a:fa:46:97:
        ea:cf:8f:ce:fa:68:b9:bd:f3:a6:40:57:85:72:bf:6b:
        e8:c3:de:ca:1c:dc:34:4b:da:33:00:ec:68:61:86:f4:
        87:2d:ff:8c:6c:b9:c7:f3:81:46:a0:83:80:1c:ad:61:
        16:45:4c:f7:70:59:68:53:f4:18:d8:1f:4b:5a:15:57
    Fingerprint (SHA-256):
        6C:E5:8F:09:8A:A0:10:8C:7F:0E:9F:12:02:DC:A0:79:3E:8C:CC:69:8B:9E:81:82:F6:00:BD:BE:DC:F1:5F:73
    Fingerprint (SHA1):
        A2:93:12:A4:45:FE:71:0D:0A:E1:99:E4:41:F1:77:0E:5B:18:9E:31

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4667: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185302 (0x1ef22396)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:25:41 2017
            Not After : Thu May 19 19:25:41 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c9:2d:86:e3:48:c2:db:d5:9c:a2:14:0c:65:65:67:ec:
                    3c:e2:71:41:c4:06:8d:51:1d:9a:28:bb:4c:65:8c:9a:
                    01:ad:9a:78:f3:a6:af:58:56:60:85:06:5a:48:b8:cf:
                    0d:d1:da:00:de:43:5c:16:c8:b7:db:12:a0:d9:35:55:
                    82:4e:bb:13:d3:0c:6d:1d:6f:97:9d:62:91:94:27:7f:
                    ea:dc:f4:43:52:e6:8c:70:fd:c2:03:34:61:0a:b2:db:
                    7c:88:09:5a:96:ea:47:67:f2:66:2d:74:e0:b5:86:7a:
                    73:8d:67:53:25:8a:ef:bc:97:42:6f:8a:22:e0:82:c7:
                    97:81:7a:8a:84:eb:fc:55:85:89:0a:cf:90:c7:d0:a0:
                    27:08:35:fb:cb:3a:64:95:bd:93:6e:2f:31:d1:25:9b:
                    eb:0e:d5:18:bb:4f:4b:61:40:d4:fa:46:a1:93:00:a9:
                    bc:51:0d:47:52:51:ee:e1:44:a0:f5:6f:29:ee:f1:64:
                    78:2d:b0:66:4e:97:81:d7:e7:7b:9e:36:55:72:52:46:
                    85:0b:9d:82:0e:76:1f:35:f4:14:56:02:d6:c8:27:53:
                    88:a2:21:38:81:73:9a:72:ea:25:94:3d:c1:98:1b:90:
                    6f:d7:9c:1a:96:2c:40:41:77:bd:8e:00:75:4b:2c:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        06:31:2f:f4:79:de:c7:fd:7d:95:31:8d:e5:b4:f3:03:
        c4:21:49:7d:9e:97:76:3b:f2:cf:c6:d2:3c:d0:a7:8f:
        31:7b:24:73:8c:e0:e7:e4:78:f4:ad:12:c4:e5:f7:48:
        c2:01:da:5d:cb:9c:5e:9e:ed:f7:43:53:7d:dd:c0:be:
        f3:27:b9:83:4a:36:68:c7:cb:ea:6c:05:19:62:b8:21:
        df:7d:0d:94:cf:26:5f:39:c6:2d:a9:89:e5:de:38:d5:
        16:68:4f:96:87:65:63:1e:9c:d9:98:77:7b:a6:1a:71:
        54:17:70:79:a0:47:2c:ad:10:aa:31:c9:5e:a6:50:c3:
        22:30:52:44:06:c0:78:c8:7d:63:b4:48:c2:a8:fa:94:
        96:12:7e:bd:3b:e8:2c:64:3e:12:a5:c7:f8:59:7e:95:
        f2:8b:d7:84:c6:40:11:5b:ca:14:76:66:5f:eb:23:ee:
        5e:dd:f4:4f:57:2e:1f:97:b9:f5:4a:90:3a:fa:46:97:
        ea:cf:8f:ce:fa:68:b9:bd:f3:a6:40:57:85:72:bf:6b:
        e8:c3:de:ca:1c:dc:34:4b:da:33:00:ec:68:61:86:f4:
        87:2d:ff:8c:6c:b9:c7:f3:81:46:a0:83:80:1c:ad:61:
        16:45:4c:f7:70:59:68:53:f4:18:d8:1f:4b:5a:15:57
    Fingerprint (SHA-256):
        6C:E5:8F:09:8A:A0:10:8C:7F:0E:9F:12:02:DC:A0:79:3E:8C:CC:69:8B:9E:81:82:F6:00:BD:BE:DC:F1:5F:73
    Fingerprint (SHA1):
        A2:93:12:A4:45:FE:71:0D:0A:E1:99:E4:41:F1:77:0E:5B:18:9E:31

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4668: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185303 (0x1ef22397)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 19:25:48 2017
            Not After : Thu May 19 19:25:48 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:07:92:ef:d2:04:32:46:73:bb:b2:6e:6b:07:17:b5:
                    8c:fa:71:67:15:fb:5e:82:9b:bb:92:4d:90:ee:53:53:
                    08:29:27:1b:85:28:d4:3e:cf:c8:8b:c0:a9:d7:1f:c0:
                    22:f0:41:d2:f6:cd:41:e6:c3:af:39:de:23:a1:22:77:
                    8e:c3:53:54:a7:d8:37:3e:6e:10:e0:41:25:41:37:cf:
                    37:64:b7:2f:17:1a:4c:ab:52:dc:1d:c8:58:74:fa:a4:
                    03:41:3f:b2:ed:ee:05:40:2b:f9:6f:9d:d3:d7:f2:cf:
                    00:4e:da:f8:28:f6:12:ee:3c:1a:ff:dc:df:a2:ab:51:
                    f8:b3:15:c3:33:1c:4d:7f:a7:e6:94:b5:eb:8b:fe:e1:
                    0e:df:ea:1b:38:50:d7:3b:69:9e:81:3e:5c:b0:a9:86:
                    18:5b:a4:c4:55:94:7d:46:ae:5f:be:f9:52:a6:1d:cf:
                    14:cb:89:aa:f4:6a:46:6c:62:e0:8b:89:1d:7f:e1:b9:
                    81:c4:7a:e9:39:32:55:6a:bf:b3:6b:fd:da:ca:4a:f9:
                    e3:c1:db:a8:d4:5e:04:6c:28:fb:4b:a5:26:83:70:f8:
                    a1:39:c3:95:b7:cd:f5:65:62:e7:d4:08:a0:a3:b2:78:
                    2d:96:c8:69:ef:aa:56:3c:76:e8:73:27:25:bc:56:29
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        bd:55:ae:1b:8f:cb:9d:53:89:95:5c:1d:64:4d:f6:19:
        b0:3d:7b:34:13:49:16:83:13:f1:87:1e:0d:68:81:54:
        84:fd:5b:54:a2:6c:d9:31:48:16:1f:13:3d:91:01:77:
        5d:9a:da:c2:40:e0:f8:3a:df:2f:b4:ec:00:1c:be:3c:
        a4:b1:35:99:93:4f:5a:41:78:6f:b6:77:dd:43:e3:1e:
        f0:82:48:aa:64:9c:bc:11:c1:99:4f:b0:2f:c9:cd:0d:
        11:93:97:5e:41:79:d2:c6:0b:8b:a8:31:1b:f8:e9:76:
        17:dd:fb:d3:f0:c2:49:c7:d7:26:0d:72:51:ad:1f:95:
        5f:3c:8e:ac:cf:ae:e8:9f:2f:93:0d:1f:25:b3:a1:dc:
        ce:bd:f4:74:f3:72:86:90:00:85:25:40:61:a1:c0:77:
        f2:94:8f:19:e7:7c:ce:92:be:4f:89:9d:66:bc:7e:3a:
        8e:0d:e6:31:53:0f:bb:f9:84:29:1b:b7:9d:ce:90:2e:
        93:3a:e1:b0:fb:60:ae:3e:93:39:4c:4a:03:a9:bb:87:
        5b:be:6e:f3:2c:53:88:ae:38:95:31:96:bd:7c:9a:d6:
        75:32:60:8f:cd:e9:5a:ae:cb:d3:fe:dd:5a:0b:85:ab:
        83:e5:bf:0a:9e:6e:94:40:75:1c:31:a2:b6:f5:78:ac
    Fingerprint (SHA-256):
        A7:BC:AC:FA:B4:1A:87:AA:03:AE:D1:51:74:C6:CE:FD:56:0D:80:BA:80:79:D2:47:14:04:6F:0C:62:D7:F9:6C
    Fingerprint (SHA1):
        1A:4A:C5:8D:1D:3A:12:B4:66:C3:DB:55:3B:0A:C4:CE:59:A8:70:91

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4669: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185303 (0x1ef22397)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 19:25:48 2017
            Not After : Thu May 19 19:25:48 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    96:07:92:ef:d2:04:32:46:73:bb:b2:6e:6b:07:17:b5:
                    8c:fa:71:67:15:fb:5e:82:9b:bb:92:4d:90:ee:53:53:
                    08:29:27:1b:85:28:d4:3e:cf:c8:8b:c0:a9:d7:1f:c0:
                    22:f0:41:d2:f6:cd:41:e6:c3:af:39:de:23:a1:22:77:
                    8e:c3:53:54:a7:d8:37:3e:6e:10:e0:41:25:41:37:cf:
                    37:64:b7:2f:17:1a:4c:ab:52:dc:1d:c8:58:74:fa:a4:
                    03:41:3f:b2:ed:ee:05:40:2b:f9:6f:9d:d3:d7:f2:cf:
                    00:4e:da:f8:28:f6:12:ee:3c:1a:ff:dc:df:a2:ab:51:
                    f8:b3:15:c3:33:1c:4d:7f:a7:e6:94:b5:eb:8b:fe:e1:
                    0e:df:ea:1b:38:50:d7:3b:69:9e:81:3e:5c:b0:a9:86:
                    18:5b:a4:c4:55:94:7d:46:ae:5f:be:f9:52:a6:1d:cf:
                    14:cb:89:aa:f4:6a:46:6c:62:e0:8b:89:1d:7f:e1:b9:
                    81:c4:7a:e9:39:32:55:6a:bf:b3:6b:fd:da:ca:4a:f9:
                    e3:c1:db:a8:d4:5e:04:6c:28:fb:4b:a5:26:83:70:f8:
                    a1:39:c3:95:b7:cd:f5:65:62:e7:d4:08:a0:a3:b2:78:
                    2d:96:c8:69:ef:aa:56:3c:76:e8:73:27:25:bc:56:29
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        bd:55:ae:1b:8f:cb:9d:53:89:95:5c:1d:64:4d:f6:19:
        b0:3d:7b:34:13:49:16:83:13:f1:87:1e:0d:68:81:54:
        84:fd:5b:54:a2:6c:d9:31:48:16:1f:13:3d:91:01:77:
        5d:9a:da:c2:40:e0:f8:3a:df:2f:b4:ec:00:1c:be:3c:
        a4:b1:35:99:93:4f:5a:41:78:6f:b6:77:dd:43:e3:1e:
        f0:82:48:aa:64:9c:bc:11:c1:99:4f:b0:2f:c9:cd:0d:
        11:93:97:5e:41:79:d2:c6:0b:8b:a8:31:1b:f8:e9:76:
        17:dd:fb:d3:f0:c2:49:c7:d7:26:0d:72:51:ad:1f:95:
        5f:3c:8e:ac:cf:ae:e8:9f:2f:93:0d:1f:25:b3:a1:dc:
        ce:bd:f4:74:f3:72:86:90:00:85:25:40:61:a1:c0:77:
        f2:94:8f:19:e7:7c:ce:92:be:4f:89:9d:66:bc:7e:3a:
        8e:0d:e6:31:53:0f:bb:f9:84:29:1b:b7:9d:ce:90:2e:
        93:3a:e1:b0:fb:60:ae:3e:93:39:4c:4a:03:a9:bb:87:
        5b:be:6e:f3:2c:53:88:ae:38:95:31:96:bd:7c:9a:d6:
        75:32:60:8f:cd:e9:5a:ae:cb:d3:fe:dd:5a:0b:85:ab:
        83:e5:bf:0a:9e:6e:94:40:75:1c:31:a2:b6:f5:78:ac
    Fingerprint (SHA-256):
        A7:BC:AC:FA:B4:1A:87:AA:03:AE:D1:51:74:C6:CE:FD:56:0D:80:BA:80:79:D2:47:14:04:6F:0C:62:D7:F9:6C
    Fingerprint (SHA1):
        1A:4A:C5:8D:1D:3A:12:B4:66:C3:DB:55:3B:0A:C4:CE:59:A8:70:91

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4670: Extension2: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #4671: AnyPolicy: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185306 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4672: AnyPolicy: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #4673: AnyPolicy: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4674: AnyPolicy: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4675: AnyPolicy: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 519185307   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4676: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4677: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4678: AnyPolicy: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4679: AnyPolicy: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 519185308   --extCP --extIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
0
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #4680: AnyPolicy: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4681: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #4682: AnyPolicy: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4683: AnyPolicy: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 519185309   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4684: AnyPolicy: Creating certficate CA3CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA3CA1.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4685: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #4686: AnyPolicy: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o User1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4687: AnyPolicy: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 519185310   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4688: AnyPolicy: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4689: AnyPolicy: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #4690: AnyPolicy: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o User2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4691: AnyPolicy: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 519185311   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4692: AnyPolicy: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4693: AnyPolicy: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB User3DB
certutil -N -d User3DB -f User3DB/dbpasswd
chains.sh: #4694: AnyPolicy: Creating DB User3DB  - PASSED
chains.sh: Creating EE certifiate request User3Req.der
certutil -s "CN=User3 EE, O=User3, C=US"  -R  -d User3DB -f User3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o User3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4695: AnyPolicy: Creating EE certifiate request User3Req.der  - PASSED
chains.sh: Creating certficate User3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 519185312   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4696: AnyPolicy: Creating certficate User3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate User3CA3.der to User3DB database
certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4697: AnyPolicy: Importing certificate User3CA3.der to User3DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4698: AnyPolicy: Creating DB AllDB  - PASSED
chains.sh: Importing certificate RootCA.der to AllDB database
certutil -A -n RootCA  -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der
chains.sh: #4699: AnyPolicy: Importing certificate RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der
chains.sh: #4700: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #4701: AnyPolicy: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA1.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der
chains.sh: #4702: AnyPolicy: Importing certificate CA3CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.1.0  User1CA2.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185306 (0x1ef2239a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:26:37 2017
            Not After : Thu May 19 19:26:37 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:59:c6:02:0b:63:17:b0:5c:0f:2b:67:65:63:0b:b0:
                    4d:c2:0f:80:2b:f8:40:82:eb:82:0d:f4:44:12:e0:72:
                    12:87:66:1b:8b:3d:36:04:d8:45:50:1f:c9:c8:4e:52:
                    bb:cc:8c:32:1f:b8:49:c7:98:bd:3d:06:ea:6d:76:34:
                    88:05:19:9e:83:ff:9e:83:ff:35:35:da:dd:92:92:87:
                    39:08:63:9f:13:c3:5c:26:0d:fc:87:db:73:56:f9:c5:
                    44:b7:e3:0d:8f:47:29:30:64:53:8e:e8:7b:e9:cd:c8:
                    6c:bf:46:d1:6d:7a:be:d8:88:53:aa:35:bc:f8:e6:dc:
                    5b:46:30:4e:62:64:e8:5c:d0:96:49:e7:21:ce:ef:02:
                    65:a6:dd:b5:64:c7:4b:0e:9d:92:45:52:df:8c:5f:a3:
                    16:3b:8f:f5:08:0d:4a:34:bf:d9:3c:96:87:25:83:b9:
                    23:b5:d2:04:41:e1:d5:29:90:be:95:7c:82:ff:99:ed:
                    ab:d5:5a:2f:2d:05:77:ec:b9:ab:3f:45:39:35:d5:18:
                    55:c1:0e:bf:d5:8c:0b:78:b1:5e:ce:18:e6:f1:a8:9c:
                    27:a2:1f:20:49:1c:64:52:42:c4:9b:23:2b:54:4d:26:
                    94:7b:7e:62:cf:68:43:24:79:eb:85:6e:0f:4d:46:cf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        b7:57:5e:07:57:44:f7:df:a7:b4:c9:c6:d7:9f:ff:c7:
        27:d0:4f:64:e9:22:c2:80:dc:48:84:8d:06:75:c6:25:
        02:97:1a:67:05:3c:74:8e:a8:a6:f5:b9:97:22:ed:1b:
        b7:60:80:2a:87:af:af:3b:fe:53:79:21:9b:ea:56:fb:
        12:fa:a7:c8:8d:95:55:21:f8:be:1c:79:c2:06:65:ca:
        97:70:b3:c1:e4:b1:46:e9:d5:f7:78:6f:8b:cc:49:2e:
        49:d4:9a:e8:6e:c1:1f:ed:bb:85:8d:d8:78:c9:8e:31:
        01:8c:ca:27:08:43:14:96:dc:16:07:95:30:5e:4c:bd:
        d5:df:bb:16:0b:1b:3c:47:41:e2:7e:4b:f9:30:b5:a1:
        d6:eb:37:d2:97:ae:66:1a:ee:fb:9d:5b:14:fc:12:f5:
        1e:15:64:71:2b:d9:b9:22:7a:a2:3b:82:2f:13:66:4f:
        cc:9c:ad:96:c3:89:ea:9c:2c:e9:10:51:91:91:ec:70:
        96:54:6f:4c:55:b1:2c:e9:d1:7a:35:32:6f:77:c9:7a:
        0b:db:8e:96:b3:6b:78:11:4a:f7:b2:8f:6a:48:6f:db:
        aa:16:c2:3d:3b:cf:b1:ea:6b:cd:37:9d:2e:e9:8f:8c:
        c5:68:29:ff:e6:8f:0f:0b:47:58:dc:c5:4c:a9:33:11
    Fingerprint (SHA-256):
        E2:B2:1B:8D:A6:78:BD:1A:F7:5E:AB:39:DB:5B:ED:B1:77:F3:E1:B2:77:D5:60:BE:CB:19:A7:49:B3:AE:C4:ED
    Fingerprint (SHA1):
        96:A3:6F:F4:18:29:7B:3A:7F:8C:87:79:D8:DA:7F:88:C1:6E:B2:B1

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4703: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.2.0  User1CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4704: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.1.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4705: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.2.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4706: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.1.0  User3CA3.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185306 (0x1ef2239a)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:26:37 2017
            Not After : Thu May 19 19:26:37 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:59:c6:02:0b:63:17:b0:5c:0f:2b:67:65:63:0b:b0:
                    4d:c2:0f:80:2b:f8:40:82:eb:82:0d:f4:44:12:e0:72:
                    12:87:66:1b:8b:3d:36:04:d8:45:50:1f:c9:c8:4e:52:
                    bb:cc:8c:32:1f:b8:49:c7:98:bd:3d:06:ea:6d:76:34:
                    88:05:19:9e:83:ff:9e:83:ff:35:35:da:dd:92:92:87:
                    39:08:63:9f:13:c3:5c:26:0d:fc:87:db:73:56:f9:c5:
                    44:b7:e3:0d:8f:47:29:30:64:53:8e:e8:7b:e9:cd:c8:
                    6c:bf:46:d1:6d:7a:be:d8:88:53:aa:35:bc:f8:e6:dc:
                    5b:46:30:4e:62:64:e8:5c:d0:96:49:e7:21:ce:ef:02:
                    65:a6:dd:b5:64:c7:4b:0e:9d:92:45:52:df:8c:5f:a3:
                    16:3b:8f:f5:08:0d:4a:34:bf:d9:3c:96:87:25:83:b9:
                    23:b5:d2:04:41:e1:d5:29:90:be:95:7c:82:ff:99:ed:
                    ab:d5:5a:2f:2d:05:77:ec:b9:ab:3f:45:39:35:d5:18:
                    55:c1:0e:bf:d5:8c:0b:78:b1:5e:ce:18:e6:f1:a8:9c:
                    27:a2:1f:20:49:1c:64:52:42:c4:9b:23:2b:54:4d:26:
                    94:7b:7e:62:cf:68:43:24:79:eb:85:6e:0f:4d:46:cf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        b7:57:5e:07:57:44:f7:df:a7:b4:c9:c6:d7:9f:ff:c7:
        27:d0:4f:64:e9:22:c2:80:dc:48:84:8d:06:75:c6:25:
        02:97:1a:67:05:3c:74:8e:a8:a6:f5:b9:97:22:ed:1b:
        b7:60:80:2a:87:af:af:3b:fe:53:79:21:9b:ea:56:fb:
        12:fa:a7:c8:8d:95:55:21:f8:be:1c:79:c2:06:65:ca:
        97:70:b3:c1:e4:b1:46:e9:d5:f7:78:6f:8b:cc:49:2e:
        49:d4:9a:e8:6e:c1:1f:ed:bb:85:8d:d8:78:c9:8e:31:
        01:8c:ca:27:08:43:14:96:dc:16:07:95:30:5e:4c:bd:
        d5:df:bb:16:0b:1b:3c:47:41:e2:7e:4b:f9:30:b5:a1:
        d6:eb:37:d2:97:ae:66:1a:ee:fb:9d:5b:14:fc:12:f5:
        1e:15:64:71:2b:d9:b9:22:7a:a2:3b:82:2f:13:66:4f:
        cc:9c:ad:96:c3:89:ea:9c:2c:e9:10:51:91:91:ec:70:
        96:54:6f:4c:55:b1:2c:e9:d1:7a:35:32:6f:77:c9:7a:
        0b:db:8e:96:b3:6b:78:11:4a:f7:b2:8f:6a:48:6f:db:
        aa:16:c2:3d:3b:cf:b1:ea:6b:cd:37:9d:2e:e9:8f:8c:
        c5:68:29:ff:e6:8f:0f:0b:47:58:dc:c5:4c:a9:33:11
    Fingerprint (SHA-256):
        E2:B2:1B:8D:A6:78:BD:1A:F7:5E:AB:39:DB:5B:ED:B1:77:F3:E1:B2:77:D5:60:BE:CB:19:A7:49:B3:AE:C4:ED
    Fingerprint (SHA1):
        96:A3:6F:F4:18:29:7B:3A:7F:8C:87:79:D8:DA:7F:88:C1:6E:B2:B1

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User3 EE,O=User3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4707: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv      -o OID.2.0  User3CA3.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4708: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #4709: AnyPolicyWithLevel: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185313 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4710: AnyPolicyWithLevel: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #4711: AnyPolicyWithLevel: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4712: AnyPolicyWithLevel: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4713: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 519185314   --extCP --extIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #4714: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4715: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA12DB
certutil -N -d CA12DB -f CA12DB/dbpasswd
chains.sh: #4716: AnyPolicyWithLevel: Creating DB CA12DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA12Req.der
certutil -s "CN=CA12 Intermediate, O=CA12, C=US"  -R -2 -d CA12DB -f CA12DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA12Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4717: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der  - PASSED
chains.sh: Creating certficate CA12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 519185315   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4718: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA12CA1.der to CA12DB database
certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4719: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database  - PASSED
chains.sh: Creating DB CA13DB
certutil -N -d CA13DB -f CA13DB/dbpasswd
chains.sh: #4720: AnyPolicyWithLevel: Creating DB CA13DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA13Req.der
certutil -s "CN=CA13 Intermediate, O=CA13, C=US"  -R -2 -d CA13DB -f CA13DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA13Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4721: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der  - PASSED
chains.sh: Creating certficate CA13CA12.der signed by CA12
certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 519185316   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4722: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12  - PASSED
chains.sh: Importing certificate CA13CA12.der to CA13DB database
certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4723: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4724: AnyPolicyWithLevel: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4725: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA13.der signed by CA13
certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 519185317   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4726: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13  - PASSED
chains.sh: Importing certificate EE1CA13.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4727: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database  - PASSED
chains.sh: Creating DB CA22DB
certutil -N -d CA22DB -f CA22DB/dbpasswd
chains.sh: #4728: AnyPolicyWithLevel: Creating DB CA22DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA22Req.der
certutil -s "CN=CA22 Intermediate, O=CA22, C=US"  -R -2 -d CA22DB -f CA22DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA22Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4729: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der  - PASSED
chains.sh: Creating certficate CA22CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 519185318   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4730: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA22CA1.der to CA22DB database
certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4731: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database  - PASSED
chains.sh: Creating DB CA23DB
certutil -N -d CA23DB -f CA23DB/dbpasswd
chains.sh: #4732: AnyPolicyWithLevel: Creating DB CA23DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA23Req.der
certutil -s "CN=CA23 Intermediate, O=CA23, C=US"  -R -2 -d CA23DB -f CA23DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA23Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4733: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der  - PASSED
chains.sh: Creating certficate CA23CA22.der signed by CA22
certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 519185319   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4734: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22  - PASSED
chains.sh: Importing certificate CA23CA22.der to CA23DB database
certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4735: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #4736: AnyPolicyWithLevel: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4737: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA23.der signed by CA23
certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 519185320   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4738: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23  - PASSED
chains.sh: Importing certificate EE2CA23.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4739: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database  - PASSED
chains.sh: Creating DB CA32DB
certutil -N -d CA32DB -f CA32DB/dbpasswd
chains.sh: #4740: AnyPolicyWithLevel: Creating DB CA32DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA32Req.der
certutil -s "CN=CA32 Intermediate, O=CA32, C=US"  -R -2 -d CA32DB -f CA32DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA32Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4741: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der  - PASSED
chains.sh: Creating certficate CA32CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 519185321   --extCP --extIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #4742: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA32CA1.der to CA32DB database
certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4743: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database  - PASSED
chains.sh: Creating DB CA33DB
certutil -N -d CA33DB -f CA33DB/dbpasswd
chains.sh: #4744: AnyPolicyWithLevel: Creating DB CA33DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA33Req.der
certutil -s "CN=CA33 Intermediate, O=CA33, C=US"  -R -2 -d CA33DB -f CA33DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA33Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4745: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der  - PASSED
chains.sh: Creating certficate CA33CA32.der signed by CA32
certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 519185322   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4746: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32  - PASSED
chains.sh: Importing certificate CA33CA32.der to CA33DB database
certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4747: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #4748: AnyPolicyWithLevel: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US"  -R  -d EE3DB -f EE3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4749: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA33.der signed by CA33
certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 519185323   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4750: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33  - PASSED
chains.sh: Importing certificate EE3CA33.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4751: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database  - PASSED
chains.sh: Creating DB CA42DB
certutil -N -d CA42DB -f CA42DB/dbpasswd
chains.sh: #4752: AnyPolicyWithLevel: Creating DB CA42DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA42Req.der
certutil -s "CN=CA42 Intermediate, O=CA42, C=US"  -R -2 -d CA42DB -f CA42DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA42Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4753: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der  - PASSED
chains.sh: Creating certficate CA42CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 519185324   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4754: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA42CA1.der to CA42DB database
certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4755: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database  - PASSED
chains.sh: Creating DB CA43DB
certutil -N -d CA43DB -f CA43DB/dbpasswd
chains.sh: #4756: AnyPolicyWithLevel: Creating DB CA43DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA43Req.der
certutil -s "CN=CA43 Intermediate, O=CA43, C=US"  -R -2 -d CA43DB -f CA43DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA43Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4757: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der  - PASSED
chains.sh: Creating certficate CA43CA42.der signed by CA42
certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 519185325   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4758: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42  - PASSED
chains.sh: Importing certificate CA43CA42.der to CA43DB database
certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4759: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #4760: AnyPolicyWithLevel: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US"  -R  -d EE4DB -f EE4DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE4Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4761: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA43.der signed by CA43
certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 519185326   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4762: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43  - PASSED
chains.sh: Importing certificate EE4CA43.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4763: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database  - PASSED
chains.sh: Creating DB CA52DB
certutil -N -d CA52DB -f CA52DB/dbpasswd
chains.sh: #4764: AnyPolicyWithLevel: Creating DB CA52DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA52Req.der
certutil -s "CN=CA52 Intermediate, O=CA52, C=US"  -R -2 -d CA52DB -f CA52DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA52Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4765: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der  - PASSED
chains.sh: Creating certficate CA52CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 519185327   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4766: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA52CA1.der to CA52DB database
certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4767: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database  - PASSED
chains.sh: Creating DB CA53DB
certutil -N -d CA53DB -f CA53DB/dbpasswd
chains.sh: #4768: AnyPolicyWithLevel: Creating DB CA53DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA53Req.der
certutil -s "CN=CA53 Intermediate, O=CA53, C=US"  -R -2 -d CA53DB -f CA53DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA53Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4769: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der  - PASSED
chains.sh: Creating certficate CA53CA52.der signed by CA52
certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 519185328   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4770: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52  - PASSED
chains.sh: Importing certificate CA53CA52.der to CA53DB database
certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4771: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database  - PASSED
chains.sh: Creating DB EE5DB
certutil -N -d EE5DB -f EE5DB/dbpasswd
chains.sh: #4772: AnyPolicyWithLevel: Creating DB EE5DB  - PASSED
chains.sh: Creating EE certifiate request EE5Req.der
certutil -s "CN=EE5 EE, O=EE5, C=US"  -R  -d EE5DB -f EE5DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE5Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4773: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der  - PASSED
chains.sh: Creating certficate EE5CA53.der signed by CA53
certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 519185329   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4774: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53  - PASSED
chains.sh: Importing certificate EE5CA53.der to EE5DB database
certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4775: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database  - PASSED
chains.sh: Creating DB CA61DB
certutil -N -d CA61DB -f CA61DB/dbpasswd
chains.sh: #4776: AnyPolicyWithLevel: Creating DB CA61DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA61Req.der
certutil -s "CN=CA61 Intermediate, O=CA61, C=US"  -R -2 -d CA61DB -f CA61DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA61Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4777: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der  - PASSED
chains.sh: Creating certficate CA61RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 519185330   --extCP --extIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n
5
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #4778: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA61RootCA.der to CA61DB database
certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4779: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database  - PASSED
chains.sh: Creating DB CA62DB
certutil -N -d CA62DB -f CA62DB/dbpasswd
chains.sh: #4780: AnyPolicyWithLevel: Creating DB CA62DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA62Req.der
certutil -s "CN=CA62 Intermediate, O=CA62, C=US"  -R -2 -d CA62DB -f CA62DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA62Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4781: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der  - PASSED
chains.sh: Creating certficate CA62CA61.der signed by CA61
certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 519185331   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4782: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61  - PASSED
chains.sh: Importing certificate CA62CA61.der to CA62DB database
certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4783: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database  - PASSED
chains.sh: Creating DB EE62DB
certutil -N -d EE62DB -f EE62DB/dbpasswd
chains.sh: #4784: AnyPolicyWithLevel: Creating DB EE62DB  - PASSED
chains.sh: Creating EE certifiate request EE62Req.der
certutil -s "CN=EE62 EE, O=EE62, C=US"  -R  -d EE62DB -f EE62DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE62Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4785: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der  - PASSED
chains.sh: Creating certficate EE62CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 519185332   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4786: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate EE62CA62.der to EE62DB database
certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4787: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database  - PASSED
chains.sh: Creating DB CA63DB
certutil -N -d CA63DB -f CA63DB/dbpasswd
chains.sh: #4788: AnyPolicyWithLevel: Creating DB CA63DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA63Req.der
certutil -s "CN=CA63 Intermediate, O=CA63, C=US"  -R -2 -d CA63DB -f CA63DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA63Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4789: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der  - PASSED
chains.sh: Creating certficate CA63CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 519185333   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4790: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate CA63CA62.der to CA63DB database
certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4791: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database  - PASSED
chains.sh: Creating DB EE63DB
certutil -N -d EE63DB -f EE63DB/dbpasswd
chains.sh: #4792: AnyPolicyWithLevel: Creating DB EE63DB  - PASSED
chains.sh: Creating EE certifiate request EE63Req.der
certutil -s "CN=EE63 EE, O=EE63, C=US"  -R  -d EE63DB -f EE63DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE63Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4793: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der  - PASSED
chains.sh: Creating certficate EE63CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 519185334   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4794: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate EE63CA63.der to EE63DB database
certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4795: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database  - PASSED
chains.sh: Creating DB CA64DB
certutil -N -d CA64DB -f CA64DB/dbpasswd
chains.sh: #4796: AnyPolicyWithLevel: Creating DB CA64DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA64Req.der
certutil -s "CN=CA64 Intermediate, O=CA64, C=US"  -R -2 -d CA64DB -f CA64DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA64Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4797: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der  - PASSED
chains.sh: Creating certficate CA64CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 519185335   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4798: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate CA64CA63.der to CA64DB database
certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4799: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database  - PASSED
chains.sh: Creating DB EE64DB
certutil -N -d EE64DB -f EE64DB/dbpasswd
chains.sh: #4800: AnyPolicyWithLevel: Creating DB EE64DB  - PASSED
chains.sh: Creating EE certifiate request EE64Req.der
certutil -s "CN=EE64 EE, O=EE64, C=US"  -R  -d EE64DB -f EE64DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE64Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4801: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der  - PASSED
chains.sh: Creating certficate EE64CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 519185336   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4802: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate EE64CA64.der to EE64DB database
certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4803: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database  - PASSED
chains.sh: Creating DB CA65DB
certutil -N -d CA65DB -f CA65DB/dbpasswd
chains.sh: #4804: AnyPolicyWithLevel: Creating DB CA65DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA65Req.der
certutil -s "CN=CA65 Intermediate, O=CA65, C=US"  -R -2 -d CA65DB -f CA65DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA65Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4805: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der  - PASSED
chains.sh: Creating certficate CA65CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 519185337   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4806: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate CA65CA64.der to CA65DB database
certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4807: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database  - PASSED
chains.sh: Creating DB EE65DB
certutil -N -d EE65DB -f EE65DB/dbpasswd
chains.sh: #4808: AnyPolicyWithLevel: Creating DB EE65DB  - PASSED
chains.sh: Creating EE certifiate request EE65Req.der
certutil -s "CN=EE65 EE, O=EE65, C=US"  -R  -d EE65DB -f EE65DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE65Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4809: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der  - PASSED
chains.sh: Creating certficate EE65CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 519185338   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4810: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate EE65CA65.der to EE65DB database
certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4811: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database  - PASSED
chains.sh: Creating DB CA66DB
certutil -N -d CA66DB -f CA66DB/dbpasswd
chains.sh: #4812: AnyPolicyWithLevel: Creating DB CA66DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA66Req.der
certutil -s "CN=CA66 Intermediate, O=CA66, C=US"  -R -2 -d CA66DB -f CA66DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA66Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4813: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der  - PASSED
chains.sh: Creating certficate CA66CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 519185339   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4814: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate CA66CA65.der to CA66DB database
certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4815: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database  - PASSED
chains.sh: Creating DB EE66DB
certutil -N -d EE66DB -f EE66DB/dbpasswd
chains.sh: #4816: AnyPolicyWithLevel: Creating DB EE66DB  - PASSED
chains.sh: Creating EE certifiate request EE66Req.der
certutil -s "CN=EE66 EE, O=EE66, C=US"  -R  -d EE66DB -f EE66DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE66Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4817: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der  - PASSED
chains.sh: Creating certficate EE66CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 519185340   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4818: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate EE66CA66.der to EE66DB database
certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4819: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database  - PASSED
chains.sh: Creating DB CA67DB
certutil -N -d CA67DB -f CA67DB/dbpasswd
chains.sh: #4820: AnyPolicyWithLevel: Creating DB CA67DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA67Req.der
certutil -s "CN=CA67 Intermediate, O=CA67, C=US"  -R -2 -d CA67DB -f CA67DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA67Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4821: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der  - PASSED
chains.sh: Creating certficate CA67CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 519185341   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4822: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate CA67CA66.der to CA67DB database
certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4823: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database  - PASSED
chains.sh: Creating DB EE67DB
certutil -N -d EE67DB -f EE67DB/dbpasswd
chains.sh: #4824: AnyPolicyWithLevel: Creating DB EE67DB  - PASSED
chains.sh: Creating EE certifiate request EE67Req.der
certutil -s "CN=EE67 EE, O=EE67, C=US"  -R  -d EE67DB -f EE67DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE67Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4825: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der  - PASSED
chains.sh: Creating certficate EE67CA67.der signed by CA67
certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 519185342   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4826: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67  - PASSED
chains.sh: Importing certificate EE67CA67.der to EE67DB database
certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4827: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4828: AnyPolicyWithLevel: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185313 (0x1ef223a1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:28:05 2017
            Not After : Thu May 19 19:28:05 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:47:63:68:f5:a4:0a:0a:73:50:47:dd:5b:9a:c6:fb:
                    3d:7f:46:98:d5:98:f3:7a:27:4a:f5:65:b1:48:e0:42:
                    54:72:87:47:e7:52:ff:44:a8:ca:b9:6e:4d:8f:a6:fd:
                    c8:16:c8:63:7f:bd:ce:45:3d:2c:18:a0:c0:42:e0:b5:
                    60:1d:b2:c6:ce:28:91:12:1c:0b:92:ba:ea:af:98:c2:
                    ec:61:62:5a:03:8d:d5:6f:3d:7e:84:e8:21:f1:4c:45:
                    25:2b:40:09:52:db:7f:f2:4f:ab:9a:e4:63:88:5d:21:
                    75:f5:3a:db:49:09:10:78:4e:07:23:45:1d:fd:d0:98:
                    b7:7e:78:9d:75:14:82:15:74:3e:f2:ed:87:1f:7a:1a:
                    01:54:8f:2c:22:fb:87:b6:83:c6:e2:96:e3:17:98:51:
                    c0:7d:a2:e6:d6:f2:73:33:22:21:a1:d2:84:f8:84:26:
                    26:fb:1c:6d:f2:91:a2:e2:41:4f:b7:78:db:86:7d:be:
                    a3:22:66:5c:83:69:b2:56:c9:6d:09:b4:2a:89:29:49:
                    dc:2a:0a:fc:12:7e:36:d0:71:e6:ff:31:8c:c1:54:64:
                    25:5e:a2:b7:df:d5:09:54:21:68:d0:1b:61:c3:a3:d8:
                    00:f0:e8:60:c7:79:cf:60:9f:5a:f4:42:cd:66:b4:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        59:e6:c8:c0:31:9c:cf:47:4e:b2:81:5d:09:74:68:55:
        da:46:21:d3:0a:d3:ed:8a:e1:85:fe:ab:2d:09:b9:5e:
        16:04:be:ee:d5:ec:7e:c6:93:ce:87:5a:cc:8f:46:11:
        fd:68:af:b8:c1:08:7c:67:d0:82:73:5b:6e:7c:c6:bd:
        98:8f:6c:36:3f:29:2b:bf:c2:2c:11:24:df:c2:86:b9:
        e5:96:68:a0:13:e6:19:44:ad:cb:95:4f:f3:90:30:37:
        03:c6:3d:68:1d:15:a7:f4:20:43:c9:bc:ab:fe:5f:f0:
        ea:1e:62:52:7d:4d:7d:e2:f7:04:ed:56:23:a3:7b:7f:
        c9:28:81:18:cd:81:75:27:ee:60:bc:c5:22:57:1f:e2:
        17:8a:b2:e6:e3:13:93:3d:52:8f:66:18:7c:51:fa:a7:
        5b:e0:fe:1f:80:67:9d:93:40:7f:cb:67:81:86:6c:35:
        77:93:e1:a0:23:30:e9:1d:a6:c2:8e:b6:1a:03:f2:1e:
        d0:82:58:5f:18:5b:f2:cf:e7:2c:09:62:df:12:25:d8:
        7f:1a:2f:2b:19:e6:14:9f:51:5c:d7:b4:59:9a:49:b0:
        cc:4d:3d:23:17:f6:d8:48:30:a3:0a:85:63:82:5a:6d:
        ca:1f:30:82:56:30:61:42:4c:3e:4a:05:cc:5e:98:46
    Fingerprint (SHA-256):
        10:95:4B:C3:DE:95:D0:10:A0:71:E2:E4:C7:7E:8E:98:40:E0:4D:6E:BF:C0:60:33:18:9A:A3:85:61:6A:3B:21
    Fingerprint (SHA1):
        22:18:75:53:87:FD:BF:C7:CB:6C:5B:4E:1F:2C:57:83:26:60:A0:C9


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4829: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4830: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185313 (0x1ef223a1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:28:05 2017
            Not After : Thu May 19 19:28:05 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:47:63:68:f5:a4:0a:0a:73:50:47:dd:5b:9a:c6:fb:
                    3d:7f:46:98:d5:98:f3:7a:27:4a:f5:65:b1:48:e0:42:
                    54:72:87:47:e7:52:ff:44:a8:ca:b9:6e:4d:8f:a6:fd:
                    c8:16:c8:63:7f:bd:ce:45:3d:2c:18:a0:c0:42:e0:b5:
                    60:1d:b2:c6:ce:28:91:12:1c:0b:92:ba:ea:af:98:c2:
                    ec:61:62:5a:03:8d:d5:6f:3d:7e:84:e8:21:f1:4c:45:
                    25:2b:40:09:52:db:7f:f2:4f:ab:9a:e4:63:88:5d:21:
                    75:f5:3a:db:49:09:10:78:4e:07:23:45:1d:fd:d0:98:
                    b7:7e:78:9d:75:14:82:15:74:3e:f2:ed:87:1f:7a:1a:
                    01:54:8f:2c:22:fb:87:b6:83:c6:e2:96:e3:17:98:51:
                    c0:7d:a2:e6:d6:f2:73:33:22:21:a1:d2:84:f8:84:26:
                    26:fb:1c:6d:f2:91:a2:e2:41:4f:b7:78:db:86:7d:be:
                    a3:22:66:5c:83:69:b2:56:c9:6d:09:b4:2a:89:29:49:
                    dc:2a:0a:fc:12:7e:36:d0:71:e6:ff:31:8c:c1:54:64:
                    25:5e:a2:b7:df:d5:09:54:21:68:d0:1b:61:c3:a3:d8:
                    00:f0:e8:60:c7:79:cf:60:9f:5a:f4:42:cd:66:b4:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        59:e6:c8:c0:31:9c:cf:47:4e:b2:81:5d:09:74:68:55:
        da:46:21:d3:0a:d3:ed:8a:e1:85:fe:ab:2d:09:b9:5e:
        16:04:be:ee:d5:ec:7e:c6:93:ce:87:5a:cc:8f:46:11:
        fd:68:af:b8:c1:08:7c:67:d0:82:73:5b:6e:7c:c6:bd:
        98:8f:6c:36:3f:29:2b:bf:c2:2c:11:24:df:c2:86:b9:
        e5:96:68:a0:13:e6:19:44:ad:cb:95:4f:f3:90:30:37:
        03:c6:3d:68:1d:15:a7:f4:20:43:c9:bc:ab:fe:5f:f0:
        ea:1e:62:52:7d:4d:7d:e2:f7:04:ed:56:23:a3:7b:7f:
        c9:28:81:18:cd:81:75:27:ee:60:bc:c5:22:57:1f:e2:
        17:8a:b2:e6:e3:13:93:3d:52:8f:66:18:7c:51:fa:a7:
        5b:e0:fe:1f:80:67:9d:93:40:7f:cb:67:81:86:6c:35:
        77:93:e1:a0:23:30:e9:1d:a6:c2:8e:b6:1a:03:f2:1e:
        d0:82:58:5f:18:5b:f2:cf:e7:2c:09:62:df:12:25:d8:
        7f:1a:2f:2b:19:e6:14:9f:51:5c:d7:b4:59:9a:49:b0:
        cc:4d:3d:23:17:f6:d8:48:30:a3:0a:85:63:82:5a:6d:
        ca:1f:30:82:56:30:61:42:4c:3e:4a:05:cc:5e:98:46
    Fingerprint (SHA-256):
        10:95:4B:C3:DE:95:D0:10:A0:71:E2:E4:C7:7E:8E:98:40:E0:4D:6E:BF:C0:60:33:18:9A:A3:85:61:6A:3B:21
    Fingerprint (SHA1):
        22:18:75:53:87:FD:BF:C7:CB:6C:5B:4E:1F:2C:57:83:26:60:A0:C9


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4831: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4832: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4833: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4834: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp       -t RootCA.der
vfychain -d AllDB -pp -vv       EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185313 (0x1ef223a1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:28:05 2017
            Not After : Thu May 19 19:28:05 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:47:63:68:f5:a4:0a:0a:73:50:47:dd:5b:9a:c6:fb:
                    3d:7f:46:98:d5:98:f3:7a:27:4a:f5:65:b1:48:e0:42:
                    54:72:87:47:e7:52:ff:44:a8:ca:b9:6e:4d:8f:a6:fd:
                    c8:16:c8:63:7f:bd:ce:45:3d:2c:18:a0:c0:42:e0:b5:
                    60:1d:b2:c6:ce:28:91:12:1c:0b:92:ba:ea:af:98:c2:
                    ec:61:62:5a:03:8d:d5:6f:3d:7e:84:e8:21:f1:4c:45:
                    25:2b:40:09:52:db:7f:f2:4f:ab:9a:e4:63:88:5d:21:
                    75:f5:3a:db:49:09:10:78:4e:07:23:45:1d:fd:d0:98:
                    b7:7e:78:9d:75:14:82:15:74:3e:f2:ed:87:1f:7a:1a:
                    01:54:8f:2c:22:fb:87:b6:83:c6:e2:96:e3:17:98:51:
                    c0:7d:a2:e6:d6:f2:73:33:22:21:a1:d2:84:f8:84:26:
                    26:fb:1c:6d:f2:91:a2:e2:41:4f:b7:78:db:86:7d:be:
                    a3:22:66:5c:83:69:b2:56:c9:6d:09:b4:2a:89:29:49:
                    dc:2a:0a:fc:12:7e:36:d0:71:e6:ff:31:8c:c1:54:64:
                    25:5e:a2:b7:df:d5:09:54:21:68:d0:1b:61:c3:a3:d8:
                    00:f0:e8:60:c7:79:cf:60:9f:5a:f4:42:cd:66:b4:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        59:e6:c8:c0:31:9c:cf:47:4e:b2:81:5d:09:74:68:55:
        da:46:21:d3:0a:d3:ed:8a:e1:85:fe:ab:2d:09:b9:5e:
        16:04:be:ee:d5:ec:7e:c6:93:ce:87:5a:cc:8f:46:11:
        fd:68:af:b8:c1:08:7c:67:d0:82:73:5b:6e:7c:c6:bd:
        98:8f:6c:36:3f:29:2b:bf:c2:2c:11:24:df:c2:86:b9:
        e5:96:68:a0:13:e6:19:44:ad:cb:95:4f:f3:90:30:37:
        03:c6:3d:68:1d:15:a7:f4:20:43:c9:bc:ab:fe:5f:f0:
        ea:1e:62:52:7d:4d:7d:e2:f7:04:ed:56:23:a3:7b:7f:
        c9:28:81:18:cd:81:75:27:ee:60:bc:c5:22:57:1f:e2:
        17:8a:b2:e6:e3:13:93:3d:52:8f:66:18:7c:51:fa:a7:
        5b:e0:fe:1f:80:67:9d:93:40:7f:cb:67:81:86:6c:35:
        77:93:e1:a0:23:30:e9:1d:a6:c2:8e:b6:1a:03:f2:1e:
        d0:82:58:5f:18:5b:f2:cf:e7:2c:09:62:df:12:25:d8:
        7f:1a:2f:2b:19:e6:14:9f:51:5c:d7:b4:59:9a:49:b0:
        cc:4d:3d:23:17:f6:d8:48:30:a3:0a:85:63:82:5a:6d:
        ca:1f:30:82:56:30:61:42:4c:3e:4a:05:cc:5e:98:46
    Fingerprint (SHA-256):
        10:95:4B:C3:DE:95:D0:10:A0:71:E2:E4:C7:7E:8E:98:40:E0:4D:6E:BF:C0:60:33:18:9A:A3:85:61:6A:3B:21
    Fingerprint (SHA1):
        22:18:75:53:87:FD:BF:C7:CB:6C:5B:4E:1F:2C:57:83:26:60:A0:C9


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US"
Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4835: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp       -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4836: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4837: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4838: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp       -t RootCA.der
vfychain -d AllDB -pp -vv       EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185313 (0x1ef223a1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:28:05 2017
            Not After : Thu May 19 19:28:05 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:47:63:68:f5:a4:0a:0a:73:50:47:dd:5b:9a:c6:fb:
                    3d:7f:46:98:d5:98:f3:7a:27:4a:f5:65:b1:48:e0:42:
                    54:72:87:47:e7:52:ff:44:a8:ca:b9:6e:4d:8f:a6:fd:
                    c8:16:c8:63:7f:bd:ce:45:3d:2c:18:a0:c0:42:e0:b5:
                    60:1d:b2:c6:ce:28:91:12:1c:0b:92:ba:ea:af:98:c2:
                    ec:61:62:5a:03:8d:d5:6f:3d:7e:84:e8:21:f1:4c:45:
                    25:2b:40:09:52:db:7f:f2:4f:ab:9a:e4:63:88:5d:21:
                    75:f5:3a:db:49:09:10:78:4e:07:23:45:1d:fd:d0:98:
                    b7:7e:78:9d:75:14:82:15:74:3e:f2:ed:87:1f:7a:1a:
                    01:54:8f:2c:22:fb:87:b6:83:c6:e2:96:e3:17:98:51:
                    c0:7d:a2:e6:d6:f2:73:33:22:21:a1:d2:84:f8:84:26:
                    26:fb:1c:6d:f2:91:a2:e2:41:4f:b7:78:db:86:7d:be:
                    a3:22:66:5c:83:69:b2:56:c9:6d:09:b4:2a:89:29:49:
                    dc:2a:0a:fc:12:7e:36:d0:71:e6:ff:31:8c:c1:54:64:
                    25:5e:a2:b7:df:d5:09:54:21:68:d0:1b:61:c3:a3:d8:
                    00:f0:e8:60:c7:79:cf:60:9f:5a:f4:42:cd:66:b4:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        59:e6:c8:c0:31:9c:cf:47:4e:b2:81:5d:09:74:68:55:
        da:46:21:d3:0a:d3:ed:8a:e1:85:fe:ab:2d:09:b9:5e:
        16:04:be:ee:d5:ec:7e:c6:93:ce:87:5a:cc:8f:46:11:
        fd:68:af:b8:c1:08:7c:67:d0:82:73:5b:6e:7c:c6:bd:
        98:8f:6c:36:3f:29:2b:bf:c2:2c:11:24:df:c2:86:b9:
        e5:96:68:a0:13:e6:19:44:ad:cb:95:4f:f3:90:30:37:
        03:c6:3d:68:1d:15:a7:f4:20:43:c9:bc:ab:fe:5f:f0:
        ea:1e:62:52:7d:4d:7d:e2:f7:04:ed:56:23:a3:7b:7f:
        c9:28:81:18:cd:81:75:27:ee:60:bc:c5:22:57:1f:e2:
        17:8a:b2:e6:e3:13:93:3d:52:8f:66:18:7c:51:fa:a7:
        5b:e0:fe:1f:80:67:9d:93:40:7f:cb:67:81:86:6c:35:
        77:93:e1:a0:23:30:e9:1d:a6:c2:8e:b6:1a:03:f2:1e:
        d0:82:58:5f:18:5b:f2:cf:e7:2c:09:62:df:12:25:d8:
        7f:1a:2f:2b:19:e6:14:9f:51:5c:d7:b4:59:9a:49:b0:
        cc:4d:3d:23:17:f6:d8:48:30:a3:0a:85:63:82:5a:6d:
        ca:1f:30:82:56:30:61:42:4c:3e:4a:05:cc:5e:98:46
    Fingerprint (SHA-256):
        10:95:4B:C3:DE:95:D0:10:A0:71:E2:E4:C7:7E:8E:98:40:E0:4D:6E:BF:C0:60:33:18:9A:A3:85:61:6A:3B:21
    Fingerprint (SHA1):
        22:18:75:53:87:FD:BF:C7:CB:6C:5B:4E:1F:2C:57:83:26:60:A0:C9


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US"
Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4839: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp       -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185313 (0x1ef223a1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:28:05 2017
            Not After : Thu May 19 19:28:05 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:47:63:68:f5:a4:0a:0a:73:50:47:dd:5b:9a:c6:fb:
                    3d:7f:46:98:d5:98:f3:7a:27:4a:f5:65:b1:48:e0:42:
                    54:72:87:47:e7:52:ff:44:a8:ca:b9:6e:4d:8f:a6:fd:
                    c8:16:c8:63:7f:bd:ce:45:3d:2c:18:a0:c0:42:e0:b5:
                    60:1d:b2:c6:ce:28:91:12:1c:0b:92:ba:ea:af:98:c2:
                    ec:61:62:5a:03:8d:d5:6f:3d:7e:84:e8:21:f1:4c:45:
                    25:2b:40:09:52:db:7f:f2:4f:ab:9a:e4:63:88:5d:21:
                    75:f5:3a:db:49:09:10:78:4e:07:23:45:1d:fd:d0:98:
                    b7:7e:78:9d:75:14:82:15:74:3e:f2:ed:87:1f:7a:1a:
                    01:54:8f:2c:22:fb:87:b6:83:c6:e2:96:e3:17:98:51:
                    c0:7d:a2:e6:d6:f2:73:33:22:21:a1:d2:84:f8:84:26:
                    26:fb:1c:6d:f2:91:a2:e2:41:4f:b7:78:db:86:7d:be:
                    a3:22:66:5c:83:69:b2:56:c9:6d:09:b4:2a:89:29:49:
                    dc:2a:0a:fc:12:7e:36:d0:71:e6:ff:31:8c:c1:54:64:
                    25:5e:a2:b7:df:d5:09:54:21:68:d0:1b:61:c3:a3:d8:
                    00:f0:e8:60:c7:79:cf:60:9f:5a:f4:42:cd:66:b4:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        59:e6:c8:c0:31:9c:cf:47:4e:b2:81:5d:09:74:68:55:
        da:46:21:d3:0a:d3:ed:8a:e1:85:fe:ab:2d:09:b9:5e:
        16:04:be:ee:d5:ec:7e:c6:93:ce:87:5a:cc:8f:46:11:
        fd:68:af:b8:c1:08:7c:67:d0:82:73:5b:6e:7c:c6:bd:
        98:8f:6c:36:3f:29:2b:bf:c2:2c:11:24:df:c2:86:b9:
        e5:96:68:a0:13:e6:19:44:ad:cb:95:4f:f3:90:30:37:
        03:c6:3d:68:1d:15:a7:f4:20:43:c9:bc:ab:fe:5f:f0:
        ea:1e:62:52:7d:4d:7d:e2:f7:04:ed:56:23:a3:7b:7f:
        c9:28:81:18:cd:81:75:27:ee:60:bc:c5:22:57:1f:e2:
        17:8a:b2:e6:e3:13:93:3d:52:8f:66:18:7c:51:fa:a7:
        5b:e0:fe:1f:80:67:9d:93:40:7f:cb:67:81:86:6c:35:
        77:93:e1:a0:23:30:e9:1d:a6:c2:8e:b6:1a:03:f2:1e:
        d0:82:58:5f:18:5b:f2:cf:e7:2c:09:62:df:12:25:d8:
        7f:1a:2f:2b:19:e6:14:9f:51:5c:d7:b4:59:9a:49:b0:
        cc:4d:3d:23:17:f6:d8:48:30:a3:0a:85:63:82:5a:6d:
        ca:1f:30:82:56:30:61:42:4c:3e:4a:05:cc:5e:98:46
    Fingerprint (SHA-256):
        10:95:4B:C3:DE:95:D0:10:A0:71:E2:E4:C7:7E:8E:98:40:E0:4D:6E:BF:C0:60:33:18:9A:A3:85:61:6A:3B:21
    Fingerprint (SHA1):
        22:18:75:53:87:FD:BF:C7:CB:6C:5B:4E:1F:2C:57:83:26:60:A0:C9


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4840: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4841: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185313 (0x1ef223a1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:28:05 2017
            Not After : Thu May 19 19:28:05 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:47:63:68:f5:a4:0a:0a:73:50:47:dd:5b:9a:c6:fb:
                    3d:7f:46:98:d5:98:f3:7a:27:4a:f5:65:b1:48:e0:42:
                    54:72:87:47:e7:52:ff:44:a8:ca:b9:6e:4d:8f:a6:fd:
                    c8:16:c8:63:7f:bd:ce:45:3d:2c:18:a0:c0:42:e0:b5:
                    60:1d:b2:c6:ce:28:91:12:1c:0b:92:ba:ea:af:98:c2:
                    ec:61:62:5a:03:8d:d5:6f:3d:7e:84:e8:21:f1:4c:45:
                    25:2b:40:09:52:db:7f:f2:4f:ab:9a:e4:63:88:5d:21:
                    75:f5:3a:db:49:09:10:78:4e:07:23:45:1d:fd:d0:98:
                    b7:7e:78:9d:75:14:82:15:74:3e:f2:ed:87:1f:7a:1a:
                    01:54:8f:2c:22:fb:87:b6:83:c6:e2:96:e3:17:98:51:
                    c0:7d:a2:e6:d6:f2:73:33:22:21:a1:d2:84:f8:84:26:
                    26:fb:1c:6d:f2:91:a2:e2:41:4f:b7:78:db:86:7d:be:
                    a3:22:66:5c:83:69:b2:56:c9:6d:09:b4:2a:89:29:49:
                    dc:2a:0a:fc:12:7e:36:d0:71:e6:ff:31:8c:c1:54:64:
                    25:5e:a2:b7:df:d5:09:54:21:68:d0:1b:61:c3:a3:d8:
                    00:f0:e8:60:c7:79:cf:60:9f:5a:f4:42:cd:66:b4:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        59:e6:c8:c0:31:9c:cf:47:4e:b2:81:5d:09:74:68:55:
        da:46:21:d3:0a:d3:ed:8a:e1:85:fe:ab:2d:09:b9:5e:
        16:04:be:ee:d5:ec:7e:c6:93:ce:87:5a:cc:8f:46:11:
        fd:68:af:b8:c1:08:7c:67:d0:82:73:5b:6e:7c:c6:bd:
        98:8f:6c:36:3f:29:2b:bf:c2:2c:11:24:df:c2:86:b9:
        e5:96:68:a0:13:e6:19:44:ad:cb:95:4f:f3:90:30:37:
        03:c6:3d:68:1d:15:a7:f4:20:43:c9:bc:ab:fe:5f:f0:
        ea:1e:62:52:7d:4d:7d:e2:f7:04:ed:56:23:a3:7b:7f:
        c9:28:81:18:cd:81:75:27:ee:60:bc:c5:22:57:1f:e2:
        17:8a:b2:e6:e3:13:93:3d:52:8f:66:18:7c:51:fa:a7:
        5b:e0:fe:1f:80:67:9d:93:40:7f:cb:67:81:86:6c:35:
        77:93:e1:a0:23:30:e9:1d:a6:c2:8e:b6:1a:03:f2:1e:
        d0:82:58:5f:18:5b:f2:cf:e7:2c:09:62:df:12:25:d8:
        7f:1a:2f:2b:19:e6:14:9f:51:5c:d7:b4:59:9a:49:b0:
        cc:4d:3d:23:17:f6:d8:48:30:a3:0a:85:63:82:5a:6d:
        ca:1f:30:82:56:30:61:42:4c:3e:4a:05:cc:5e:98:46
    Fingerprint (SHA-256):
        10:95:4B:C3:DE:95:D0:10:A0:71:E2:E4:C7:7E:8E:98:40:E0:4D:6E:BF:C0:60:33:18:9A:A3:85:61:6A:3B:21
    Fingerprint (SHA1):
        22:18:75:53:87:FD:BF:C7:CB:6C:5B:4E:1F:2C:57:83:26:60:A0:C9


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4842: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4843: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4844: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.2.5.29.32.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4845: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp      -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp       -t RootCA.der
vfychain -d AllDB -pp -vv       EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185313 (0x1ef223a1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:28:05 2017
            Not After : Thu May 19 19:28:05 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:47:63:68:f5:a4:0a:0a:73:50:47:dd:5b:9a:c6:fb:
                    3d:7f:46:98:d5:98:f3:7a:27:4a:f5:65:b1:48:e0:42:
                    54:72:87:47:e7:52:ff:44:a8:ca:b9:6e:4d:8f:a6:fd:
                    c8:16:c8:63:7f:bd:ce:45:3d:2c:18:a0:c0:42:e0:b5:
                    60:1d:b2:c6:ce:28:91:12:1c:0b:92:ba:ea:af:98:c2:
                    ec:61:62:5a:03:8d:d5:6f:3d:7e:84:e8:21:f1:4c:45:
                    25:2b:40:09:52:db:7f:f2:4f:ab:9a:e4:63:88:5d:21:
                    75:f5:3a:db:49:09:10:78:4e:07:23:45:1d:fd:d0:98:
                    b7:7e:78:9d:75:14:82:15:74:3e:f2:ed:87:1f:7a:1a:
                    01:54:8f:2c:22:fb:87:b6:83:c6:e2:96:e3:17:98:51:
                    c0:7d:a2:e6:d6:f2:73:33:22:21:a1:d2:84:f8:84:26:
                    26:fb:1c:6d:f2:91:a2:e2:41:4f:b7:78:db:86:7d:be:
                    a3:22:66:5c:83:69:b2:56:c9:6d:09:b4:2a:89:29:49:
                    dc:2a:0a:fc:12:7e:36:d0:71:e6:ff:31:8c:c1:54:64:
                    25:5e:a2:b7:df:d5:09:54:21:68:d0:1b:61:c3:a3:d8:
                    00:f0:e8:60:c7:79:cf:60:9f:5a:f4:42:cd:66:b4:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        59:e6:c8:c0:31:9c:cf:47:4e:b2:81:5d:09:74:68:55:
        da:46:21:d3:0a:d3:ed:8a:e1:85:fe:ab:2d:09:b9:5e:
        16:04:be:ee:d5:ec:7e:c6:93:ce:87:5a:cc:8f:46:11:
        fd:68:af:b8:c1:08:7c:67:d0:82:73:5b:6e:7c:c6:bd:
        98:8f:6c:36:3f:29:2b:bf:c2:2c:11:24:df:c2:86:b9:
        e5:96:68:a0:13:e6:19:44:ad:cb:95:4f:f3:90:30:37:
        03:c6:3d:68:1d:15:a7:f4:20:43:c9:bc:ab:fe:5f:f0:
        ea:1e:62:52:7d:4d:7d:e2:f7:04:ed:56:23:a3:7b:7f:
        c9:28:81:18:cd:81:75:27:ee:60:bc:c5:22:57:1f:e2:
        17:8a:b2:e6:e3:13:93:3d:52:8f:66:18:7c:51:fa:a7:
        5b:e0:fe:1f:80:67:9d:93:40:7f:cb:67:81:86:6c:35:
        77:93:e1:a0:23:30:e9:1d:a6:c2:8e:b6:1a:03:f2:1e:
        d0:82:58:5f:18:5b:f2:cf:e7:2c:09:62:df:12:25:d8:
        7f:1a:2f:2b:19:e6:14:9f:51:5c:d7:b4:59:9a:49:b0:
        cc:4d:3d:23:17:f6:d8:48:30:a3:0a:85:63:82:5a:6d:
        ca:1f:30:82:56:30:61:42:4c:3e:4a:05:cc:5e:98:46
    Fingerprint (SHA-256):
        10:95:4B:C3:DE:95:D0:10:A0:71:E2:E4:C7:7E:8E:98:40:E0:4D:6E:BF:C0:60:33:18:9A:A3:85:61:6A:3B:21
    Fingerprint (SHA1):
        22:18:75:53:87:FD:BF:C7:CB:6C:5B:4E:1F:2C:57:83:26:60:A0:C9


Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US"
Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US"
Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4846: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp       -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185313 (0x1ef223a1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:28:05 2017
            Not After : Thu May 19 19:28:05 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:47:63:68:f5:a4:0a:0a:73:50:47:dd:5b:9a:c6:fb:
                    3d:7f:46:98:d5:98:f3:7a:27:4a:f5:65:b1:48:e0:42:
                    54:72:87:47:e7:52:ff:44:a8:ca:b9:6e:4d:8f:a6:fd:
                    c8:16:c8:63:7f:bd:ce:45:3d:2c:18:a0:c0:42:e0:b5:
                    60:1d:b2:c6:ce:28:91:12:1c:0b:92:ba:ea:af:98:c2:
                    ec:61:62:5a:03:8d:d5:6f:3d:7e:84:e8:21:f1:4c:45:
                    25:2b:40:09:52:db:7f:f2:4f:ab:9a:e4:63:88:5d:21:
                    75:f5:3a:db:49:09:10:78:4e:07:23:45:1d:fd:d0:98:
                    b7:7e:78:9d:75:14:82:15:74:3e:f2:ed:87:1f:7a:1a:
                    01:54:8f:2c:22:fb:87:b6:83:c6:e2:96:e3:17:98:51:
                    c0:7d:a2:e6:d6:f2:73:33:22:21:a1:d2:84:f8:84:26:
                    26:fb:1c:6d:f2:91:a2:e2:41:4f:b7:78:db:86:7d:be:
                    a3:22:66:5c:83:69:b2:56:c9:6d:09:b4:2a:89:29:49:
                    dc:2a:0a:fc:12:7e:36:d0:71:e6:ff:31:8c:c1:54:64:
                    25:5e:a2:b7:df:d5:09:54:21:68:d0:1b:61:c3:a3:d8:
                    00:f0:e8:60:c7:79:cf:60:9f:5a:f4:42:cd:66:b4:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        59:e6:c8:c0:31:9c:cf:47:4e:b2:81:5d:09:74:68:55:
        da:46:21:d3:0a:d3:ed:8a:e1:85:fe:ab:2d:09:b9:5e:
        16:04:be:ee:d5:ec:7e:c6:93:ce:87:5a:cc:8f:46:11:
        fd:68:af:b8:c1:08:7c:67:d0:82:73:5b:6e:7c:c6:bd:
        98:8f:6c:36:3f:29:2b:bf:c2:2c:11:24:df:c2:86:b9:
        e5:96:68:a0:13:e6:19:44:ad:cb:95:4f:f3:90:30:37:
        03:c6:3d:68:1d:15:a7:f4:20:43:c9:bc:ab:fe:5f:f0:
        ea:1e:62:52:7d:4d:7d:e2:f7:04:ed:56:23:a3:7b:7f:
        c9:28:81:18:cd:81:75:27:ee:60:bc:c5:22:57:1f:e2:
        17:8a:b2:e6:e3:13:93:3d:52:8f:66:18:7c:51:fa:a7:
        5b:e0:fe:1f:80:67:9d:93:40:7f:cb:67:81:86:6c:35:
        77:93:e1:a0:23:30:e9:1d:a6:c2:8e:b6:1a:03:f2:1e:
        d0:82:58:5f:18:5b:f2:cf:e7:2c:09:62:df:12:25:d8:
        7f:1a:2f:2b:19:e6:14:9f:51:5c:d7:b4:59:9a:49:b0:
        cc:4d:3d:23:17:f6:d8:48:30:a3:0a:85:63:82:5a:6d:
        ca:1f:30:82:56:30:61:42:4c:3e:4a:05:cc:5e:98:46
    Fingerprint (SHA-256):
        10:95:4B:C3:DE:95:D0:10:A0:71:E2:E4:C7:7E:8E:98:40:E0:4D:6E:BF:C0:60:33:18:9A:A3:85:61:6A:3B:21
    Fingerprint (SHA1):
        22:18:75:53:87:FD:BF:C7:CB:6C:5B:4E:1F:2C:57:83:26:60:A0:C9


Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US"
Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4847: AnyPolicyWithLevel: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185313 (0x1ef223a1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:28:05 2017
            Not After : Thu May 19 19:28:05 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:47:63:68:f5:a4:0a:0a:73:50:47:dd:5b:9a:c6:fb:
                    3d:7f:46:98:d5:98:f3:7a:27:4a:f5:65:b1:48:e0:42:
                    54:72:87:47:e7:52:ff:44:a8:ca:b9:6e:4d:8f:a6:fd:
                    c8:16:c8:63:7f:bd:ce:45:3d:2c:18:a0:c0:42:e0:b5:
                    60:1d:b2:c6:ce:28:91:12:1c:0b:92:ba:ea:af:98:c2:
                    ec:61:62:5a:03:8d:d5:6f:3d:7e:84:e8:21:f1:4c:45:
                    25:2b:40:09:52:db:7f:f2:4f:ab:9a:e4:63:88:5d:21:
                    75:f5:3a:db:49:09:10:78:4e:07:23:45:1d:fd:d0:98:
                    b7:7e:78:9d:75:14:82:15:74:3e:f2:ed:87:1f:7a:1a:
                    01:54:8f:2c:22:fb:87:b6:83:c6:e2:96:e3:17:98:51:
                    c0:7d:a2:e6:d6:f2:73:33:22:21:a1:d2:84:f8:84:26:
                    26:fb:1c:6d:f2:91:a2:e2:41:4f:b7:78:db:86:7d:be:
                    a3:22:66:5c:83:69:b2:56:c9:6d:09:b4:2a:89:29:49:
                    dc:2a:0a:fc:12:7e:36:d0:71:e6:ff:31:8c:c1:54:64:
                    25:5e:a2:b7:df:d5:09:54:21:68:d0:1b:61:c3:a3:d8:
                    00:f0:e8:60:c7:79:cf:60:9f:5a:f4:42:cd:66:b4:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        59:e6:c8:c0:31:9c:cf:47:4e:b2:81:5d:09:74:68:55:
        da:46:21:d3:0a:d3:ed:8a:e1:85:fe:ab:2d:09:b9:5e:
        16:04:be:ee:d5:ec:7e:c6:93:ce:87:5a:cc:8f:46:11:
        fd:68:af:b8:c1:08:7c:67:d0:82:73:5b:6e:7c:c6:bd:
        98:8f:6c:36:3f:29:2b:bf:c2:2c:11:24:df:c2:86:b9:
        e5:96:68:a0:13:e6:19:44:ad:cb:95:4f:f3:90:30:37:
        03:c6:3d:68:1d:15:a7:f4:20:43:c9:bc:ab:fe:5f:f0:
        ea:1e:62:52:7d:4d:7d:e2:f7:04:ed:56:23:a3:7b:7f:
        c9:28:81:18:cd:81:75:27:ee:60:bc:c5:22:57:1f:e2:
        17:8a:b2:e6:e3:13:93:3d:52:8f:66:18:7c:51:fa:a7:
        5b:e0:fe:1f:80:67:9d:93:40:7f:cb:67:81:86:6c:35:
        77:93:e1:a0:23:30:e9:1d:a6:c2:8e:b6:1a:03:f2:1e:
        d0:82:58:5f:18:5b:f2:cf:e7:2c:09:62:df:12:25:d8:
        7f:1a:2f:2b:19:e6:14:9f:51:5c:d7:b4:59:9a:49:b0:
        cc:4d:3d:23:17:f6:d8:48:30:a3:0a:85:63:82:5a:6d:
        ca:1f:30:82:56:30:61:42:4c:3e:4a:05:cc:5e:98:46
    Fingerprint (SHA-256):
        10:95:4B:C3:DE:95:D0:10:A0:71:E2:E4:C7:7E:8E:98:40:E0:4D:6E:BF:C0:60:33:18:9A:A3:85:61:6A:3B:21
    Fingerprint (SHA1):
        22:18:75:53:87:FD:BF:C7:CB:6C:5B:4E:1F:2C:57:83:26:60:A0:C9


Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US"
Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4848: AnyPolicyWithLevel: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185313 (0x1ef223a1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:28:05 2017
            Not After : Thu May 19 19:28:05 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:47:63:68:f5:a4:0a:0a:73:50:47:dd:5b:9a:c6:fb:
                    3d:7f:46:98:d5:98:f3:7a:27:4a:f5:65:b1:48:e0:42:
                    54:72:87:47:e7:52:ff:44:a8:ca:b9:6e:4d:8f:a6:fd:
                    c8:16:c8:63:7f:bd:ce:45:3d:2c:18:a0:c0:42:e0:b5:
                    60:1d:b2:c6:ce:28:91:12:1c:0b:92:ba:ea:af:98:c2:
                    ec:61:62:5a:03:8d:d5:6f:3d:7e:84:e8:21:f1:4c:45:
                    25:2b:40:09:52:db:7f:f2:4f:ab:9a:e4:63:88:5d:21:
                    75:f5:3a:db:49:09:10:78:4e:07:23:45:1d:fd:d0:98:
                    b7:7e:78:9d:75:14:82:15:74:3e:f2:ed:87:1f:7a:1a:
                    01:54:8f:2c:22:fb:87:b6:83:c6:e2:96:e3:17:98:51:
                    c0:7d:a2:e6:d6:f2:73:33:22:21:a1:d2:84:f8:84:26:
                    26:fb:1c:6d:f2:91:a2:e2:41:4f:b7:78:db:86:7d:be:
                    a3:22:66:5c:83:69:b2:56:c9:6d:09:b4:2a:89:29:49:
                    dc:2a:0a:fc:12:7e:36:d0:71:e6:ff:31:8c:c1:54:64:
                    25:5e:a2:b7:df:d5:09:54:21:68:d0:1b:61:c3:a3:d8:
                    00:f0:e8:60:c7:79:cf:60:9f:5a:f4:42:cd:66:b4:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        59:e6:c8:c0:31:9c:cf:47:4e:b2:81:5d:09:74:68:55:
        da:46:21:d3:0a:d3:ed:8a:e1:85:fe:ab:2d:09:b9:5e:
        16:04:be:ee:d5:ec:7e:c6:93:ce:87:5a:cc:8f:46:11:
        fd:68:af:b8:c1:08:7c:67:d0:82:73:5b:6e:7c:c6:bd:
        98:8f:6c:36:3f:29:2b:bf:c2:2c:11:24:df:c2:86:b9:
        e5:96:68:a0:13:e6:19:44:ad:cb:95:4f:f3:90:30:37:
        03:c6:3d:68:1d:15:a7:f4:20:43:c9:bc:ab:fe:5f:f0:
        ea:1e:62:52:7d:4d:7d:e2:f7:04:ed:56:23:a3:7b:7f:
        c9:28:81:18:cd:81:75:27:ee:60:bc:c5:22:57:1f:e2:
        17:8a:b2:e6:e3:13:93:3d:52:8f:66:18:7c:51:fa:a7:
        5b:e0:fe:1f:80:67:9d:93:40:7f:cb:67:81:86:6c:35:
        77:93:e1:a0:23:30:e9:1d:a6:c2:8e:b6:1a:03:f2:1e:
        d0:82:58:5f:18:5b:f2:cf:e7:2c:09:62:df:12:25:d8:
        7f:1a:2f:2b:19:e6:14:9f:51:5c:d7:b4:59:9a:49:b0:
        cc:4d:3d:23:17:f6:d8:48:30:a3:0a:85:63:82:5a:6d:
        ca:1f:30:82:56:30:61:42:4c:3e:4a:05:cc:5e:98:46
    Fingerprint (SHA-256):
        10:95:4B:C3:DE:95:D0:10:A0:71:E2:E4:C7:7E:8E:98:40:E0:4D:6E:BF:C0:60:33:18:9A:A3:85:61:6A:3B:21
    Fingerprint (SHA1):
        22:18:75:53:87:FD:BF:C7:CB:6C:5B:4E:1F:2C:57:83:26:60:A0:C9


Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US"
Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4849: AnyPolicyWithLevel: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185313 (0x1ef223a1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:28:05 2017
            Not After : Thu May 19 19:28:05 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:47:63:68:f5:a4:0a:0a:73:50:47:dd:5b:9a:c6:fb:
                    3d:7f:46:98:d5:98:f3:7a:27:4a:f5:65:b1:48:e0:42:
                    54:72:87:47:e7:52:ff:44:a8:ca:b9:6e:4d:8f:a6:fd:
                    c8:16:c8:63:7f:bd:ce:45:3d:2c:18:a0:c0:42:e0:b5:
                    60:1d:b2:c6:ce:28:91:12:1c:0b:92:ba:ea:af:98:c2:
                    ec:61:62:5a:03:8d:d5:6f:3d:7e:84:e8:21:f1:4c:45:
                    25:2b:40:09:52:db:7f:f2:4f:ab:9a:e4:63:88:5d:21:
                    75:f5:3a:db:49:09:10:78:4e:07:23:45:1d:fd:d0:98:
                    b7:7e:78:9d:75:14:82:15:74:3e:f2:ed:87:1f:7a:1a:
                    01:54:8f:2c:22:fb:87:b6:83:c6:e2:96:e3:17:98:51:
                    c0:7d:a2:e6:d6:f2:73:33:22:21:a1:d2:84:f8:84:26:
                    26:fb:1c:6d:f2:91:a2:e2:41:4f:b7:78:db:86:7d:be:
                    a3:22:66:5c:83:69:b2:56:c9:6d:09:b4:2a:89:29:49:
                    dc:2a:0a:fc:12:7e:36:d0:71:e6:ff:31:8c:c1:54:64:
                    25:5e:a2:b7:df:d5:09:54:21:68:d0:1b:61:c3:a3:d8:
                    00:f0:e8:60:c7:79:cf:60:9f:5a:f4:42:cd:66:b4:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        59:e6:c8:c0:31:9c:cf:47:4e:b2:81:5d:09:74:68:55:
        da:46:21:d3:0a:d3:ed:8a:e1:85:fe:ab:2d:09:b9:5e:
        16:04:be:ee:d5:ec:7e:c6:93:ce:87:5a:cc:8f:46:11:
        fd:68:af:b8:c1:08:7c:67:d0:82:73:5b:6e:7c:c6:bd:
        98:8f:6c:36:3f:29:2b:bf:c2:2c:11:24:df:c2:86:b9:
        e5:96:68:a0:13:e6:19:44:ad:cb:95:4f:f3:90:30:37:
        03:c6:3d:68:1d:15:a7:f4:20:43:c9:bc:ab:fe:5f:f0:
        ea:1e:62:52:7d:4d:7d:e2:f7:04:ed:56:23:a3:7b:7f:
        c9:28:81:18:cd:81:75:27:ee:60:bc:c5:22:57:1f:e2:
        17:8a:b2:e6:e3:13:93:3d:52:8f:66:18:7c:51:fa:a7:
        5b:e0:fe:1f:80:67:9d:93:40:7f:cb:67:81:86:6c:35:
        77:93:e1:a0:23:30:e9:1d:a6:c2:8e:b6:1a:03:f2:1e:
        d0:82:58:5f:18:5b:f2:cf:e7:2c:09:62:df:12:25:d8:
        7f:1a:2f:2b:19:e6:14:9f:51:5c:d7:b4:59:9a:49:b0:
        cc:4d:3d:23:17:f6:d8:48:30:a3:0a:85:63:82:5a:6d:
        ca:1f:30:82:56:30:61:42:4c:3e:4a:05:cc:5e:98:46
    Fingerprint (SHA-256):
        10:95:4B:C3:DE:95:D0:10:A0:71:E2:E4:C7:7E:8E:98:40:E0:4D:6E:BF:C0:60:33:18:9A:A3:85:61:6A:3B:21
    Fingerprint (SHA1):
        22:18:75:53:87:FD:BF:C7:CB:6C:5B:4E:1F:2C:57:83:26:60:A0:C9


Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US"
Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4850: AnyPolicyWithLevel: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185313 (0x1ef223a1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:28:05 2017
            Not After : Thu May 19 19:28:05 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:47:63:68:f5:a4:0a:0a:73:50:47:dd:5b:9a:c6:fb:
                    3d:7f:46:98:d5:98:f3:7a:27:4a:f5:65:b1:48:e0:42:
                    54:72:87:47:e7:52:ff:44:a8:ca:b9:6e:4d:8f:a6:fd:
                    c8:16:c8:63:7f:bd:ce:45:3d:2c:18:a0:c0:42:e0:b5:
                    60:1d:b2:c6:ce:28:91:12:1c:0b:92:ba:ea:af:98:c2:
                    ec:61:62:5a:03:8d:d5:6f:3d:7e:84:e8:21:f1:4c:45:
                    25:2b:40:09:52:db:7f:f2:4f:ab:9a:e4:63:88:5d:21:
                    75:f5:3a:db:49:09:10:78:4e:07:23:45:1d:fd:d0:98:
                    b7:7e:78:9d:75:14:82:15:74:3e:f2:ed:87:1f:7a:1a:
                    01:54:8f:2c:22:fb:87:b6:83:c6:e2:96:e3:17:98:51:
                    c0:7d:a2:e6:d6:f2:73:33:22:21:a1:d2:84:f8:84:26:
                    26:fb:1c:6d:f2:91:a2:e2:41:4f:b7:78:db:86:7d:be:
                    a3:22:66:5c:83:69:b2:56:c9:6d:09:b4:2a:89:29:49:
                    dc:2a:0a:fc:12:7e:36:d0:71:e6:ff:31:8c:c1:54:64:
                    25:5e:a2:b7:df:d5:09:54:21:68:d0:1b:61:c3:a3:d8:
                    00:f0:e8:60:c7:79:cf:60:9f:5a:f4:42:cd:66:b4:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        59:e6:c8:c0:31:9c:cf:47:4e:b2:81:5d:09:74:68:55:
        da:46:21:d3:0a:d3:ed:8a:e1:85:fe:ab:2d:09:b9:5e:
        16:04:be:ee:d5:ec:7e:c6:93:ce:87:5a:cc:8f:46:11:
        fd:68:af:b8:c1:08:7c:67:d0:82:73:5b:6e:7c:c6:bd:
        98:8f:6c:36:3f:29:2b:bf:c2:2c:11:24:df:c2:86:b9:
        e5:96:68:a0:13:e6:19:44:ad:cb:95:4f:f3:90:30:37:
        03:c6:3d:68:1d:15:a7:f4:20:43:c9:bc:ab:fe:5f:f0:
        ea:1e:62:52:7d:4d:7d:e2:f7:04:ed:56:23:a3:7b:7f:
        c9:28:81:18:cd:81:75:27:ee:60:bc:c5:22:57:1f:e2:
        17:8a:b2:e6:e3:13:93:3d:52:8f:66:18:7c:51:fa:a7:
        5b:e0:fe:1f:80:67:9d:93:40:7f:cb:67:81:86:6c:35:
        77:93:e1:a0:23:30:e9:1d:a6:c2:8e:b6:1a:03:f2:1e:
        d0:82:58:5f:18:5b:f2:cf:e7:2c:09:62:df:12:25:d8:
        7f:1a:2f:2b:19:e6:14:9f:51:5c:d7:b4:59:9a:49:b0:
        cc:4d:3d:23:17:f6:d8:48:30:a3:0a:85:63:82:5a:6d:
        ca:1f:30:82:56:30:61:42:4c:3e:4a:05:cc:5e:98:46
    Fingerprint (SHA-256):
        10:95:4B:C3:DE:95:D0:10:A0:71:E2:E4:C7:7E:8E:98:40:E0:4D:6E:BF:C0:60:33:18:9A:A3:85:61:6A:3B:21
    Fingerprint (SHA1):
        22:18:75:53:87:FD:BF:C7:CB:6C:5B:4E:1F:2C:57:83:26:60:A0:C9


Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US"
Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US"
Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #4851: AnyPolicyWithLevel: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv      -o OID.1.0  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4852: AnyPolicyWithLevel: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp      -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4853: explicitPolicy: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185343 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4854: explicitPolicy: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4855: explicitPolicy: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB nonEVCADB
certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd
chains.sh: #4856: explicitPolicy: Creating DB nonEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request nonEVCAReq.der
certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US"  -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o nonEVCAReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4857: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der  - PASSED
chains.sh: Creating certficate nonEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 519185344   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4858: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database
certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4859: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database  - PASSED
chains.sh: Creating DB EVCADB
certutil -N -d EVCADB -f EVCADB/dbpasswd
chains.sh: #4860: explicitPolicy: Creating DB EVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request EVCAReq.der
certutil -s "CN=EVCA Intermediate, O=EVCA, C=US"  -R -2 -d EVCADB -f EVCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EVCAReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4861: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der  - PASSED
chains.sh: Creating certficate EVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 519185345   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4862: explicitPolicy: Creating certficate EVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate EVCARoot.der to EVCADB database
certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4863: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database  - PASSED
chains.sh: Creating DB otherEVCADB
certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd
chains.sh: #4864: explicitPolicy: Creating DB otherEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request otherEVCAReq.der
certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US"  -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o otherEVCAReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4865: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der  - PASSED
chains.sh: Creating certficate otherEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 519185346   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4866: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database
certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4867: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database  - PASSED
chains.sh: Creating DB validEVDB
certutil -N -d validEVDB -f validEVDB/dbpasswd
chains.sh: #4868: explicitPolicy: Creating DB validEVDB  - PASSED
chains.sh: Creating EE certifiate request validEVReq.der
certutil -s "CN=validEV EE, O=validEV, C=US"  -R  -d validEVDB -f validEVDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o validEVReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4869: explicitPolicy: Creating EE certifiate request validEVReq.der  - PASSED
chains.sh: Creating certficate validEVEVCA.der signed by EVCA
certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 519185347   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4870: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA  - PASSED
chains.sh: Importing certificate validEVEVCA.der to validEVDB database
certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4871: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database  - PASSED
chains.sh: Creating DB invalidEVDB
certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd
chains.sh: #4872: explicitPolicy: Creating DB invalidEVDB  - PASSED
chains.sh: Creating EE certifiate request invalidEVReq.der
certutil -s "CN=invalidEV EE, O=invalidEV, C=US"  -R  -d invalidEVDB -f invalidEVDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o invalidEVReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4873: explicitPolicy: Creating EE certifiate request invalidEVReq.der  - PASSED
chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA
certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 519185348   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4874: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA  - PASSED
chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database
certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4875: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database  - PASSED
chains.sh: Creating DB wrongEVOIDDB
certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd
chains.sh: #4876: explicitPolicy: Creating DB wrongEVOIDDB  - PASSED
chains.sh: Creating EE certifiate request wrongEVOIDReq.der
certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US"  -R  -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o wrongEVOIDReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4877: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der  - PASSED
chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA
certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 519185349   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4878: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA  - PASSED
chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database
certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4879: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4880: explicitPolicy: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  validEVEVCA.der EVCARoot.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185343 (0x1ef223bf)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:34:24 2017
            Not After : Thu May 19 19:34:24 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e3:55:51:42:5a:b2:7f:21:2d:50:57:52:fc:b4:1a:5f:
                    32:8a:f6:f3:c5:24:6e:72:a8:55:de:6e:3c:b5:a3:96:
                    96:d8:c4:f7:4e:86:83:63:74:c9:21:8e:06:ca:78:fc:
                    3d:50:ff:87:82:0c:34:31:1d:a3:2e:31:fc:ee:a4:3a:
                    02:bf:16:b2:ca:d4:84:dc:24:df:db:5f:e6:ff:ea:47:
                    38:c1:1b:6d:50:fd:9f:4c:94:0d:12:38:37:6c:f0:99:
                    ab:68:4e:80:a4:2c:f3:61:80:bf:08:f6:a0:fa:4a:ce:
                    ed:8d:a4:68:1b:ce:ad:ad:09:82:a5:62:a4:ac:e2:01:
                    f2:22:a9:57:ca:03:20:2b:14:6e:f1:1a:a4:aa:2a:f1:
                    7b:b1:2f:d7:a2:ef:1e:ac:0f:b4:93:f7:38:c7:16:c7:
                    28:18:22:10:7c:57:15:93:b4:8d:66:f8:aa:b8:bc:0f:
                    fb:02:90:e5:d9:96:4e:e9:bb:70:8d:3e:2c:f3:8d:be:
                    74:c3:90:b2:c7:64:d6:f9:65:52:81:54:5a:b8:16:a2:
                    c2:5d:88:9b:bd:5c:c7:99:6a:f0:2d:19:68:95:5b:28:
                    eb:f5:01:8c:c6:62:ef:46:a7:88:17:91:43:a4:71:b9:
                    8f:fb:53:f6:61:52:db:36:b5:e1:d8:c0:dd:00:1e:97
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        99:39:ac:d2:35:a7:ad:18:58:f8:61:e2:87:c6:b0:6b:
        5b:bb:d2:c5:75:51:ac:54:d0:c1:01:14:17:86:70:60:
        7a:ac:28:68:09:9b:8a:8f:d4:6b:82:97:45:5b:d1:70:
        19:f7:85:c0:26:df:e9:a7:e6:77:70:77:86:f0:37:83:
        4e:f9:fa:04:9a:ef:44:be:da:91:94:b1:81:bc:f8:5e:
        07:7a:4f:f3:b9:0c:9b:02:de:7f:ac:fc:c8:6f:90:36:
        a1:ca:77:92:79:12:cc:aa:5b:e2:89:23:ff:57:35:20:
        ac:d1:81:85:13:9e:65:5c:53:0c:e7:6d:34:b2:7f:7f:
        ad:fb:a2:3b:9f:e8:87:ae:af:29:89:0b:99:fd:d7:e0:
        39:40:03:c8:2f:a3:1e:67:80:75:6e:79:26:e1:42:bb:
        cd:89:b1:91:84:cf:2e:e1:b7:63:e8:cb:9c:c9:a8:32:
        55:6e:4e:86:80:86:57:41:96:9f:26:f4:5e:1b:77:b1:
        2e:9e:68:b4:a2:da:ed:61:36:89:db:11:3b:bb:8b:c4:
        bf:9e:dc:24:65:4a:d1:f2:64:da:71:6f:8c:95:78:05:
        56:48:cd:30:88:68:96:52:7a:35:fc:e4:2d:0a:0c:fa:
        bc:ac:9a:dd:2f:92:45:a5:98:e2:88:73:6d:76:ac:de
    Fingerprint (SHA-256):
        18:A0:53:BD:25:19:39:08:BA:F8:FD:A3:CB:EA:28:B8:EA:FC:F7:B3:CE:35:22:21:B9:49:72:0A:07:00:29:85
    Fingerprint (SHA1):
        A8:65:CF:A5:75:4C:2D:83:AE:8D:E2:95:4F:FD:89:5D:8A:B1:79:56


Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #4881: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4882: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv      -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4883: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp      -o OID.1.0  -t Root.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #4884: explicitPolicy: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags -d AllDB -pp      -o OID.1.0 
vfychain -d AllDB -pp -vv      -o OID.1.0  validEVEVCA.der EVCARoot.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185343 (0x1ef223bf)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:34:24 2017
            Not After : Thu May 19 19:34:24 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e3:55:51:42:5a:b2:7f:21:2d:50:57:52:fc:b4:1a:5f:
                    32:8a:f6:f3:c5:24:6e:72:a8:55:de:6e:3c:b5:a3:96:
                    96:d8:c4:f7:4e:86:83:63:74:c9:21:8e:06:ca:78:fc:
                    3d:50:ff:87:82:0c:34:31:1d:a3:2e:31:fc:ee:a4:3a:
                    02:bf:16:b2:ca:d4:84:dc:24:df:db:5f:e6:ff:ea:47:
                    38:c1:1b:6d:50:fd:9f:4c:94:0d:12:38:37:6c:f0:99:
                    ab:68:4e:80:a4:2c:f3:61:80:bf:08:f6:a0:fa:4a:ce:
                    ed:8d:a4:68:1b:ce:ad:ad:09:82:a5:62:a4:ac:e2:01:
                    f2:22:a9:57:ca:03:20:2b:14:6e:f1:1a:a4:aa:2a:f1:
                    7b:b1:2f:d7:a2:ef:1e:ac:0f:b4:93:f7:38:c7:16:c7:
                    28:18:22:10:7c:57:15:93:b4:8d:66:f8:aa:b8:bc:0f:
                    fb:02:90:e5:d9:96:4e:e9:bb:70:8d:3e:2c:f3:8d:be:
                    74:c3:90:b2:c7:64:d6:f9:65:52:81:54:5a:b8:16:a2:
                    c2:5d:88:9b:bd:5c:c7:99:6a:f0:2d:19:68:95:5b:28:
                    eb:f5:01:8c:c6:62:ef:46:a7:88:17:91:43:a4:71:b9:
                    8f:fb:53:f6:61:52:db:36:b5:e1:d8:c0:dd:00:1e:97
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        99:39:ac:d2:35:a7:ad:18:58:f8:61:e2:87:c6:b0:6b:
        5b:bb:d2:c5:75:51:ac:54:d0:c1:01:14:17:86:70:60:
        7a:ac:28:68:09:9b:8a:8f:d4:6b:82:97:45:5b:d1:70:
        19:f7:85:c0:26:df:e9:a7:e6:77:70:77:86:f0:37:83:
        4e:f9:fa:04:9a:ef:44:be:da:91:94:b1:81:bc:f8:5e:
        07:7a:4f:f3:b9:0c:9b:02:de:7f:ac:fc:c8:6f:90:36:
        a1:ca:77:92:79:12:cc:aa:5b:e2:89:23:ff:57:35:20:
        ac:d1:81:85:13:9e:65:5c:53:0c:e7:6d:34:b2:7f:7f:
        ad:fb:a2:3b:9f:e8:87:ae:af:29:89:0b:99:fd:d7:e0:
        39:40:03:c8:2f:a3:1e:67:80:75:6e:79:26:e1:42:bb:
        cd:89:b1:91:84:cf:2e:e1:b7:63:e8:cb:9c:c9:a8:32:
        55:6e:4e:86:80:86:57:41:96:9f:26:f4:5e:1b:77:b1:
        2e:9e:68:b4:a2:da:ed:61:36:89:db:11:3b:bb:8b:c4:
        bf:9e:dc:24:65:4a:d1:f2:64:da:71:6f:8c:95:78:05:
        56:48:cd:30:88:68:96:52:7a:35:fc:e4:2d:0a:0c:fa:
        bc:ac:9a:dd:2f:92:45:a5:98:e2:88:73:6d:76:ac:de
    Fingerprint (SHA-256):
        18:A0:53:BD:25:19:39:08:BA:F8:FD:A3:CB:EA:28:B8:EA:FC:F7:B3:CE:35:22:21:B9:49:72:0A:07:00:29:85
    Fingerprint (SHA1):
        A8:65:CF:A5:75:4C:2D:83:AE:8D:E2:95:4F:FD:89:5D:8A:B1:79:56

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #4885: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags -d AllDB -pp      -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp      -o OID.1.0 
vfychain -d AllDB -pp -vv      -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4886: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp      -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp      -o OID.1.0 
vfychain -d AllDB -pp -vv      -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4887: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp      -o OID.1.0  - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4888: Mapping: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185350 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4889: Mapping: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4890: Mapping: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4891: Mapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4892: Mapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 519185351   --extCP --extPM < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #4893: Mapping: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4894: Mapping: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4895: Mapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4896: Mapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 519185352   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4897: Mapping: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4898: Mapping: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #4899: Mapping: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4900: Mapping: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 519185353   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4901: Mapping: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4902: Mapping: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4903: Mapping: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #4904: Mapping: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #4905: Mapping: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #4906: Mapping: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185350 (0x1ef223c6)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:36:11 2017
            Not After : Thu May 19 19:36:11 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:f4:5c:72:c5:38:dd:0c:b3:1b:59:c4:6d:6c:dd:ba:
                    ed:06:fc:f0:86:eb:2b:60:57:66:07:5d:6a:50:a5:36:
                    d6:ca:f0:5f:6a:9d:11:b5:bc:f1:83:c4:f5:56:82:2c:
                    a9:71:ec:6a:89:f8:81:f7:74:b4:bb:29:d5:3a:83:a8:
                    c4:d2:56:98:5b:00:7c:31:f9:22:9c:74:45:92:2b:c0:
                    e8:77:36:dd:95:6f:bc:51:39:0d:23:79:0e:04:bd:e6:
                    ba:97:41:84:ec:a9:1d:2e:2e:c8:02:82:1f:51:bc:95:
                    2d:b9:9f:80:59:54:62:5f:50:13:04:85:31:94:20:66:
                    de:54:9f:6b:72:d1:cd:36:32:dd:6f:78:66:81:c6:3c:
                    70:42:3b:8e:69:53:40:4b:32:bc:75:5e:df:88:11:74:
                    b1:65:8b:19:93:50:40:f8:81:1f:c7:90:6d:fc:10:49:
                    ae:70:70:ff:7e:69:19:cf:d2:7e:c9:86:d2:ec:d3:1c:
                    c4:1e:59:1c:59:df:bb:cf:c1:bf:e4:df:31:91:4f:41:
                    53:9d:9b:b8:d3:ea:fe:2d:0b:c9:7b:5f:dc:71:2d:d3:
                    d1:c3:9d:0e:c6:29:8a:a3:ce:8d:5b:c0:a2:ed:67:ad:
                    ca:5c:96:c2:8f:17:6e:1b:a4:e8:6f:f5:8d:da:e2:27
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        4c:fe:77:27:36:00:3e:ee:d8:3a:f2:54:d1:15:2e:b1:
        8f:cc:f5:9f:53:43:b8:48:7e:4c:32:94:7b:1d:e7:df:
        6f:05:7c:54:fb:8e:a5:df:db:8f:45:34:d7:37:9b:ae:
        e8:57:3a:74:ac:00:22:f4:f9:00:46:e9:ff:9c:49:32:
        d5:ce:d0:14:dd:2b:dc:ce:f4:be:f8:a3:9f:b9:3c:99:
        61:b1:c1:08:52:c6:ef:4a:98:a3:af:a5:31:82:10:2c:
        38:3e:43:5e:c5:83:ce:00:76:96:68:20:7e:95:5c:19:
        b9:f6:22:d0:7d:72:17:2a:f5:3d:41:07:20:73:32:ff:
        fc:aa:a3:0a:22:18:8d:57:cd:9c:14:c5:f7:ac:fe:70:
        2c:cf:66:53:78:45:a3:b2:d2:a0:82:34:af:a4:23:da:
        75:81:e6:2c:9b:d5:0b:a9:70:0c:8a:72:0a:f7:bd:04:
        9e:9e:c7:89:74:d8:bd:f3:11:40:0b:80:8e:8e:a9:7a:
        ad:5c:4b:3f:96:57:63:66:75:98:18:43:6f:30:0d:88:
        a1:2e:92:85:85:d2:49:c7:5e:5c:49:10:2e:a1:d6:c8:
        83:d9:8d:31:3b:92:1e:e1:d0:a4:10:d9:cc:9e:0a:e6:
        41:97:af:26:e2:b7:01:fc:35:a2:9e:ef:cb:92:63:84
    Fingerprint (SHA-256):
        A0:9A:24:D0:EB:50:D7:CF:9D:68:9A:D6:E8:A3:DF:09:2C:22:80:E8:8A:2F:36:E2:71:BA:BF:C2:50:1F:F1:42
    Fingerprint (SHA1):
        0B:83:D9:54:E0:C2:CE:39:C7:BE:62:08:6C:14:93:5A:01:0A:3D:7C

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4907: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4908: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4909: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185351 (0x1ef223c7)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:36:18 2017
            Not After : Thu May 19 19:36:18 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e2:d6:a2:81:fb:c0:bc:b1:91:9e:3b:f6:41:5d:81:84:
                    1a:f7:4a:d1:d2:75:e2:39:f4:04:7b:c8:45:56:c5:f1:
                    f2:33:c2:ea:3a:28:e2:72:6b:2e:74:55:a9:4d:e5:19:
                    90:55:fa:40:46:6b:00:ab:38:3b:f0:41:0c:04:9e:80:
                    1b:0b:36:f5:27:00:95:d9:37:24:29:f2:09:6e:4c:a2:
                    d7:40:a8:fd:fb:4b:f7:99:06:10:d8:72:23:eb:fa:84:
                    9b:1e:8d:f7:87:59:c5:9c:33:1a:55:4a:f4:80:8a:11:
                    e2:e1:cd:e3:48:82:52:46:48:38:93:85:34:19:a3:fd:
                    a5:8c:7d:0a:a5:28:6d:8c:3d:2a:dc:2d:a6:c4:16:25:
                    ed:20:55:bf:5c:90:c7:92:bc:e9:0e:50:41:6a:42:b3:
                    86:54:63:69:df:76:e2:a5:10:72:07:55:99:c3:34:cb:
                    c3:23:56:94:60:44:1f:7f:91:20:96:dd:e5:b3:87:2a:
                    2d:ec:8e:b5:5b:40:39:78:b7:33:70:db:bf:eb:da:64:
                    a9:cd:85:e9:4b:95:ff:81:ef:2a:04:9d:6b:31:e5:b6:
                    5f:c1:22:5a:22:9e:8b:cb:dc:00:25:3a:dd:d2:3b:7e:
                    a0:aa:49:d1:cf:c6:3f:f3:08:14:76:9b:f2:a7:98:2b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        48:bf:88:33:c4:f1:8b:ca:a5:c9:a5:40:94:a3:df:28:
        fe:74:90:5d:5b:98:c1:a9:11:e3:24:a0:46:dc:69:90:
        90:5c:22:d6:97:25:fa:af:99:50:63:6a:17:38:f0:bf:
        96:31:b1:e2:33:1a:9e:f5:d3:e3:2b:71:1d:74:aa:31:
        66:81:61:a5:9f:86:25:88:81:74:e3:a6:58:c5:f0:8e:
        11:c7:77:02:6c:e0:a0:86:0e:d3:29:2d:52:65:7d:cf:
        a1:5d:23:d9:72:19:ed:31:89:02:c2:4c:4e:0b:c8:1d:
        0e:27:16:b1:6b:da:8b:fe:18:12:72:e8:25:13:f2:44:
        54:47:9b:35:52:9b:f9:c6:29:9f:90:0a:b6:30:b9:3f:
        f2:83:d6:1a:b9:e6:b0:f3:44:f5:bb:d0:df:bf:e6:f4:
        53:bf:85:a3:e4:55:1a:61:5b:66:12:9e:ba:39:52:7a:
        90:c8:25:50:d0:be:e5:ac:db:b0:30:30:7b:dc:f8:aa:
        48:41:52:ec:31:9f:e2:c6:9e:15:d3:0b:9a:dc:ed:cf:
        4d:2f:5b:8c:40:dc:96:87:12:ac:50:85:f8:5c:45:28:
        8b:57:e1:2f:ef:14:81:b8:f9:96:ba:d4:35:b9:b0:7f:
        5c:a9:d4:23:fc:33:a6:20:d7:64:b3:f0:3c:62:3b:f3
    Fingerprint (SHA-256):
        61:BB:24:1C:2F:A9:6D:C0:6A:3B:5C:AA:60:98:99:B5:7D:65:81:1A:EB:A5:50:C5:04:29:0E:9D:C8:52:93:94
    Fingerprint (SHA1):
        68:D3:CE:AE:07:91:79:7A:08:98:79:A0:6A:1C:2E:32:21:11:3B:97

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4910: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4911: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185352 (0x1ef223c8)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 19:36:25 2017
            Not After : Thu May 19 19:36:25 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d7:7a:b1:22:a6:97:a6:15:52:85:6f:9e:38:f8:d6:d2:
                    98:01:0f:4f:df:20:dd:01:70:bb:c7:d0:cd:1d:b8:16:
                    7a:e8:33:62:3b:ce:7e:07:1f:2f:cc:e2:17:15:31:17:
                    6e:f7:ae:57:27:b6:81:73:51:43:92:9b:d1:b5:b4:ff:
                    1a:d4:a9:73:aa:93:4f:03:ef:8c:59:86:65:62:f7:7b:
                    6f:63:e0:cb:07:e4:46:d5:ff:87:a9:fe:6d:dd:98:f3:
                    a1:f6:99:c9:d5:73:3f:84:c8:47:a7:9a:c5:17:4a:f0:
                    74:5f:1a:5d:02:a0:e7:76:4d:94:d4:58:f2:3d:63:00:
                    8b:01:de:6f:f5:66:e8:cf:2a:dd:33:58:a9:f5:b4:c2:
                    dc:bd:77:a4:ff:c7:85:71:5d:bf:25:65:c1:3e:e6:ed:
                    70:de:bc:6b:99:49:9f:cf:f6:12:0d:e7:aa:af:a8:67:
                    f7:cd:ad:e7:50:da:d1:2a:02:94:43:22:b0:76:09:33:
                    01:5a:5d:39:75:cc:42:69:de:45:87:4e:a3:b1:04:16:
                    c5:1f:8d:7f:a0:df:75:d8:ca:1a:36:d2:b5:41:3f:12:
                    9b:63:13:82:04:bf:41:a6:a9:a4:73:57:1e:f1:a5:9b:
                    3e:46:bb:bf:ca:c6:57:64:c3:43:37:6d:e8:4a:49:31
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        79:39:e4:83:8e:ec:59:62:e4:79:7b:5c:46:6e:05:69:
        ab:c8:b6:08:e3:d8:9c:c0:88:d6:5e:84:34:76:f2:68:
        7c:e2:5a:cf:cb:30:18:f7:e6:d7:e2:da:7f:4c:f4:a4:
        1d:36:c7:9d:8a:aa:13:ab:da:1f:7e:fc:ef:56:8e:36:
        be:9f:28:ab:32:4c:c2:a2:db:75:8a:f5:13:8f:56:c0:
        19:a7:ca:5e:06:2c:0e:05:ba:a0:3e:64:0f:cb:22:6d:
        9a:54:6f:ad:2d:8f:2e:a2:07:4e:ae:e6:44:68:4e:c4:
        a9:d8:d9:ca:8f:e7:fc:13:49:0f:1d:04:eb:34:fb:3f:
        48:88:0f:cb:7c:df:05:7f:81:c9:7e:6f:8b:80:a7:78:
        7d:08:4b:7c:77:54:f3:44:87:df:2a:5b:fa:05:22:40:
        77:e7:56:9c:8a:0d:cb:74:b1:31:7c:cc:c2:27:b5:0d:
        88:ae:d5:66:2a:91:ff:60:e8:fe:da:0f:2e:bf:d7:6b:
        b4:e0:d2:3c:e5:10:c9:28:cd:eb:49:2c:fb:9a:b8:87:
        10:c4:9c:27:7a:16:8a:e2:54:c2:11:4d:33:0b:5f:df:
        0b:ba:f5:04:7a:78:ad:8e:ee:83:0b:84:c0:9b:2d:31:
        13:26:12:68:89:17:59:46:8f:5c:f6:63:38:11:59:4a
    Fingerprint (SHA-256):
        E6:EC:E7:43:96:1F:F3:5F:34:96:7C:55:64:61:2C:31:DE:45:23:0A:C7:5F:82:66:50:73:9D:F4:E1:96:06:8E
    Fingerprint (SHA1):
        DB:C3:22:68:67:BF:5C:FE:15:90:98:04:ED:A2:33:77:86:0B:B6:D9

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #4912: Mapping: Verifying certificate(s)  UserCA2.der with flags -d AllDB -pp      -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4913: Mapping2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185354 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4914: Mapping2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4915: Mapping2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4916: Mapping2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4917: Mapping2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 519185355   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4918: Mapping2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4919: Mapping2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4920: Mapping2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4921: Mapping2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 519185356   --extCP --extPM < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #4922: Mapping2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4923: Mapping2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #4924: Mapping2: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4925: Mapping2: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 519185357   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4926: Mapping2: Creating certficate CA3CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate CA3CA2.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4927: Mapping2: Importing certificate CA3CA2.der to CA3DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #4928: Mapping2: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4929: Mapping2: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 519185358   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4930: Mapping2: Creating certficate UserCA3.der signed by CA3  - PASSED
chains.sh: Importing certificate UserCA3.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4931: Mapping2: Importing certificate UserCA3.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4932: Mapping2: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #4933: Mapping2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #4934: Mapping2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #4935: Mapping2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA2.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der
chains.sh: #4936: Mapping2: Importing certificate CA3CA2.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA3.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185354 (0x1ef223ca)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:36:43 2017
            Not After : Thu May 19 19:36:43 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bf:f3:c7:3d:f9:89:ad:a5:ad:16:c4:2d:19:59:ce:79:
                    06:0e:67:8f:aa:c0:2e:0b:85:5f:e6:65:c1:a8:a6:a2:
                    03:5b:66:bf:dc:5f:4a:55:b2:04:dd:a3:41:c0:8c:a4:
                    ba:5c:a5:fd:9e:35:8c:1e:f6:68:44:35:e0:07:6d:ca:
                    f2:cb:7a:be:33:f2:9f:ca:c1:d8:d4:d4:d4:18:9c:c8:
                    36:1a:d4:c8:4c:3c:20:40:46:13:17:88:02:98:80:74:
                    b8:84:45:df:a3:f3:e9:e6:bb:f8:b9:37:51:ee:91:1a:
                    e6:b6:15:a8:1a:c2:84:c1:d3:4e:6d:a5:62:45:50:96:
                    2f:cd:11:60:a6:02:7c:05:97:99:04:b3:29:6b:39:12:
                    5e:0d:cd:11:ef:b5:dd:d9:c8:54:13:8c:74:24:86:45:
                    43:42:ec:9d:ad:98:02:b3:3a:6c:c0:ff:a5:59:e2:74:
                    70:0e:93:29:04:fc:22:8d:66:6f:d4:0c:ae:a3:14:81:
                    9a:d9:e7:51:3e:78:d5:ba:7c:ae:6b:9a:32:32:0b:25:
                    7b:ad:61:89:06:1b:c5:a8:5a:f3:81:c6:44:6a:8d:c7:
                    d7:26:f0:04:c2:65:9f:c8:1d:88:32:8f:38:7a:d4:68:
                    4c:3e:03:0a:8a:d2:5c:e0:b2:eb:08:46:51:e3:25:ef
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        50:cb:cd:9a:10:d6:8b:23:60:48:f9:1a:1b:e7:51:55:
        83:40:2a:dc:d3:eb:1c:eb:f2:39:38:a6:ee:a8:e6:30:
        e5:e2:3f:f8:ec:84:35:ed:47:2a:df:33:31:e5:56:df:
        70:8a:91:65:a2:77:10:91:92:e6:af:0e:57:3e:24:02:
        b7:6e:97:b4:81:3a:d9:5d:70:52:9c:1c:ba:a3:a1:de:
        9b:17:6f:a3:cb:49:71:8b:7b:2a:3a:00:9a:4c:16:b8:
        15:8f:a0:60:1c:1e:f1:94:e8:be:64:8f:4e:37:df:ea:
        e4:c8:45:4b:16:7a:51:b2:52:6e:a0:1f:04:27:7e:c3:
        59:d8:8f:79:7f:71:51:8f:12:29:f2:17:fb:ed:7b:60:
        b3:3a:c1:0a:19:ae:4f:d4:62:ca:e8:fe:e1:8c:ea:8b:
        5a:85:95:f0:bc:86:1b:8d:dd:57:7e:6c:6c:f5:9e:d2:
        8f:82:dd:26:c5:df:41:b0:75:d1:d8:a5:d1:cc:41:4d:
        6f:cf:eb:b8:a7:39:9f:d5:c3:9c:d4:2c:b0:40:a7:82:
        d5:d6:15:71:d8:a7:32:b8:a8:a6:ed:d4:bd:d8:b7:a6:
        04:85:3d:db:be:cc:e2:82:e7:b0:2d:a6:6a:4f:33:31:
        56:50:c7:30:d1:c1:9e:18:1c:33:f3:63:43:83:1d:c9
    Fingerprint (SHA-256):
        EB:18:F3:E9:FB:9F:93:93:2D:C5:2A:2E:96:75:62:D3:1A:AE:22:79:A5:B8:9A:A5:FD:84:3A:F2:F8:A6:D7:F9
    Fingerprint (SHA1):
        63:3B:11:7F:C3:65:1E:97:13:D0:6C:23:37:D3:18:51:07:A2:34:91

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4937: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA3.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4938: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA3.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185355 (0x1ef223cb)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:36:52 2017
            Not After : Thu May 19 19:36:52 2022
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    db:4a:f2:48:6f:ca:e5:2f:7f:a4:e5:ae:46:67:f7:2f:
                    96:92:91:8f:84:f7:04:ad:f5:0f:cf:9b:a9:8e:8d:79:
                    b0:0a:04:42:c2:d2:40:dc:ad:b6:fa:41:7a:e1:0a:9a:
                    9b:0a:03:3c:bc:79:6a:72:44:5b:08:48:b4:cf:25:8d:
                    41:b0:57:03:9c:fa:cb:94:30:7e:ad:29:27:9a:77:2e:
                    87:5d:69:fb:e8:a6:77:0c:42:05:d0:20:b1:82:41:20:
                    6d:dd:aa:de:26:e6:63:01:25:8c:fa:ae:a5:e5:c1:83:
                    37:1f:e4:db:f0:30:d2:89:46:29:fe:66:5a:2b:ac:e7:
                    e8:23:e0:f7:4e:c8:0b:51:07:e2:c7:c9:d6:b4:78:a6:
                    f3:df:c5:a2:95:d3:47:3b:74:ea:ec:d2:d1:7f:21:c4:
                    bd:60:0e:af:f7:9d:2e:e9:18:85:bf:9b:9d:82:13:e3:
                    dc:a4:31:4f:a8:eb:19:85:91:b4:87:7b:35:b5:11:e7:
                    1d:1d:a7:c2:ea:d3:0e:04:dc:95:2f:e9:2a:47:13:6e:
                    1e:f8:ed:11:53:27:cc:1b:d9:9d:70:22:0c:f1:a1:54:
                    09:5c:ba:a3:59:68:d6:f5:d4:a4:75:ee:84:bc:75:1e:
                    7e:97:67:e5:60:c8:44:63:74:f5:33:45:56:67:46:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        85:77:fe:51:1b:9b:03:d3:a7:f9:75:97:ff:e5:f8:62:
        26:7d:9b:ca:71:ea:73:3d:4b:14:c5:23:47:c5:51:da:
        c8:4e:bb:f4:db:48:b8:e7:00:42:c5:46:3f:d5:70:f0:
        ca:73:3d:7e:59:89:b1:d8:42:28:ba:67:a4:e0:b4:95:
        ce:23:b8:68:17:c3:87:b3:46:0f:6b:9d:00:53:6f:12:
        df:53:5b:ec:d6:3d:47:b9:0e:35:9a:6b:07:23:80:d0:
        8c:43:fe:65:1f:0f:49:2b:60:c0:d4:25:af:e1:50:11:
        3d:c0:8e:d5:d1:6f:94:14:7c:cf:78:47:f6:68:b9:1d:
        7d:95:90:c1:f8:75:fd:11:f1:30:82:46:65:27:0e:be:
        a8:12:ae:80:7f:96:85:09:33:74:54:13:4b:98:46:7e:
        6d:38:12:5a:ff:8d:25:a7:6a:08:6b:48:04:f3:ee:1e:
        88:77:7f:83:d0:34:f2:5f:de:9d:19:02:b0:a8:43:7a:
        61:be:ba:df:f6:6a:d8:8c:d9:2a:57:49:65:be:fa:fe:
        bb:f7:62:bb:7d:fe:45:10:eb:91:a4:18:83:d2:e3:81:
        66:f0:27:f5:cc:74:e1:c5:6a:cb:e7:db:95:38:79:2f:
        20:05:20:8c:95:77:10:5d:fc:47:4a:84:c6:9f:56:03
    Fingerprint (SHA-256):
        C2:31:94:4B:35:87:46:DE:03:8F:9D:0B:63:56:49:BB:FD:3F:E1:35:B0:81:85:F5:74:AF:8B:FB:FF:EF:B3:38
    Fingerprint (SHA1):
        EF:DD:CD:CE:C0:DF:9B:DF:D3:B5:AC:D3:D3:E7:C5:2E:6B:59:65:F5

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #4939: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA3.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4940: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.0  UserCA3.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #4941: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv      -o OID.1.1  UserCA3.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185356 (0x1ef223cc)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 19:37:03 2017
            Not After : Thu May 19 19:37:03 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:77:3e:ce:56:47:ba:f6:61:c6:b0:38:16:a2:c1:d7:
                    76:13:42:64:8c:f6:6a:26:f8:af:6a:24:80:15:2a:78:
                    df:89:11:27:4e:3f:e0:12:25:23:51:0f:9d:a5:c5:88:
                    7f:53:24:48:75:1f:9f:9e:c8:f0:e6:76:f6:6c:c2:7e:
                    58:e0:34:79:ee:ee:11:48:08:f5:89:20:80:e7:7c:cc:
                    92:c6:69:74:db:f0:52:98:71:f7:8e:19:34:a6:69:1b:
                    30:20:70:7b:9d:92:19:ab:f2:7f:77:15:5e:7c:e6:81:
                    90:55:86:9a:25:e2:a5:f9:89:68:33:64:9f:c0:67:fc:
                    86:1c:e5:85:7a:c0:0f:a0:41:2c:8e:71:9b:d4:ce:26:
                    19:8c:04:d8:a0:24:12:9f:5c:4d:7e:7e:d1:bd:bb:07:
                    3c:88:61:33:d1:dc:6c:db:69:97:6a:57:9e:b4:0d:a3:
                    0b:cb:2d:b9:57:27:7e:bb:ea:eb:49:bd:ac:d8:a2:45:
                    8a:5d:ef:30:bd:5c:15:ea:d0:b9:a5:28:af:29:a5:a7:
                    c5:8d:07:04:7e:ae:04:8c:84:fa:a5:92:1f:b7:72:7b:
                    ab:65:2b:e7:ce:3d:d7:03:4d:8e:dd:f0:ec:24:f6:3a:
                    3a:b2:c1:48:ee:69:17:f0:d1:cb:1a:61:aa:1d:1a:9b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        c3:13:db:89:b6:a9:34:65:60:e1:8c:34:78:1a:a6:ba:
        bb:78:62:d6:23:32:02:10:28:97:1c:3a:79:68:2d:37:
        f8:79:66:bb:ec:da:df:39:9c:d0:6a:43:2f:b8:8d:7e:
        93:44:8b:83:b4:52:f5:d9:60:f5:75:ea:7f:11:5c:f7:
        56:95:0e:c1:82:f3:c0:b4:e8:02:4b:2d:fd:04:a7:d4:
        83:6a:f8:04:a3:3c:0e:b2:d6:9d:80:dd:15:d4:30:18:
        47:6e:12:23:2a:2c:bd:fd:71:9a:b3:33:ef:b2:67:ff:
        c2:c1:04:e7:02:0b:3a:75:70:4f:1e:34:41:c4:84:50:
        87:c6:68:a9:ce:de:65:67:5f:5c:2c:14:57:5f:61:3c:
        23:7f:8f:28:e8:ae:a0:59:2c:91:c8:78:c4:d7:9e:d5:
        58:04:61:c9:8e:86:92:34:a8:bd:22:b4:17:ed:6e:e4:
        29:53:fa:36:e1:90:48:96:37:d8:b4:36:65:79:65:c0:
        d7:a3:d4:87:5c:9f:a6:8b:c0:58:13:5f:10:98:f9:45:
        00:d8:74:c6:5d:58:ce:4b:8d:40:a1:81:63:98:84:fa:
        a7:ca:f1:28:6d:4f:3c:21:5c:7d:26:92:be:0c:9f:14:
        79:e1:88:47:2f:ad:1e:74:3f:80:6d:70:4a:9a:42:d1
    Fingerprint (SHA-256):
        E1:80:0C:69:28:EA:8F:2D:45:D5:AD:74:CE:9A:6F:AE:DF:27:B2:25:45:FF:EF:7E:1D:11:76:BA:55:1E:6E:3D
    Fingerprint (SHA1):
        11:C3:59:5D:00:CE:4B:78:43:86:6E:E4:42:82:CC:1B:36:F1:A0:FB

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #4942: Mapping2: Verifying certificate(s)  UserCA3.der with flags -d AllDB -pp      -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #4943: AIA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185359 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4944: AIA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #4945: AIA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4946: AIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4947: AIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 519185360   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4948: AIA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4949: AIA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #4950: AIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4951: AIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 519185361   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-CA1Root-519185138.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4952: AIA: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4953: AIA: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #4954: AIA: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o UserReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4955: AIA: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 519185362   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4956: AIA: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4957: AIA: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d UserDB -pp       -t Root.der
vfychain -d UserDB -pp -vv       UserCA2.der CA2CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA1 Intermediate,O=CA1,C=US
Returned value is 1, expected result is fail
chains.sh: #4958: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d UserDB -pp       -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d UserDB -pp   -f    -t Root.der
vfychain -d UserDB -pp -vv   -f    UserCA2.der CA2CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185359 (0x1ef223cf)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:37:41 2017
            Not After : Thu May 19 19:37:41 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:80:93:bb:0d:69:5f:01:5f:d2:a9:e0:f4:47:4a:36:
                    fd:01:2e:c1:20:14:f0:d9:98:a4:b1:ce:c1:ee:e0:d7:
                    80:75:c3:ee:d9:e1:13:66:0f:49:16:71:53:4b:af:96:
                    eb:9c:77:b0:63:6d:92:fd:d2:cc:de:b4:a2:21:f8:ef:
                    bc:8b:42:ec:ee:7e:af:d4:f8:1e:a7:34:54:ae:9f:ac:
                    bb:5d:e4:a8:3b:6e:15:13:f9:f1:3a:0a:d4:26:08:3c:
                    81:e0:e1:95:f8:ea:31:2a:e8:97:98:28:15:fc:ec:78:
                    30:b8:6b:9b:93:bc:23:31:33:66:55:b7:b1:83:ee:13:
                    4c:ca:6d:76:92:5d:db:8f:66:46:7e:8b:fc:86:1f:40:
                    7d:65:86:9b:93:88:a9:f1:56:8a:7f:46:82:6d:5f:5f:
                    52:b3:54:00:bd:6a:b6:16:5c:76:fa:ee:81:a8:da:8f:
                    ef:b3:e6:45:bc:98:59:e6:8d:a3:c9:33:db:74:d5:2b:
                    28:c6:6a:36:34:47:91:44:cb:23:be:2b:18:fd:1b:43:
                    fa:52:22:98:eb:66:8d:1b:ec:09:39:9a:0e:83:6d:84:
                    3f:3c:68:50:e9:f5:42:d9:93:65:e6:5a:20:54:a9:61:
                    4f:9b:14:87:8c:26:ce:48:a1:c6:fe:56:ab:13:db:99
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        0d:c0:f3:6e:3a:14:e6:04:4a:d4:5d:f1:29:ca:18:a6:
        8e:ce:50:59:13:c7:ff:e3:ce:0a:79:45:31:db:f3:4c:
        33:9e:29:21:5e:9d:f7:7e:e9:1a:bd:7c:c8:ba:a9:99:
        d7:cc:f0:5a:09:09:ce:61:8b:c5:96:e7:24:8c:cc:a2:
        5a:14:49:dc:fd:25:af:6a:c7:3e:ff:99:d7:e4:2a:22:
        44:bd:99:3c:a0:3c:88:0c:2d:6b:dd:ee:ab:47:10:d4:
        64:a7:f1:af:57:c7:d1:86:71:97:f5:79:47:80:00:88:
        73:3d:44:cb:56:e6:ad:5a:42:02:eb:45:a7:24:12:cc:
        a8:d7:b6:bc:55:be:55:fd:4a:a4:2f:97:96:b6:24:6e:
        2f:ae:2f:ed:f1:f2:f7:0f:3b:23:34:68:5a:f9:0d:9e:
        43:d1:1f:29:21:0c:2f:c6:f0:fb:d2:5c:42:45:b2:21:
        2e:a1:ff:34:8e:fd:53:e2:86:a4:b7:ef:95:34:84:36:
        e0:86:e9:2c:ad:4c:8f:28:eb:02:bf:6a:ee:76:e4:17:
        af:f3:fc:c5:6f:c0:c4:ac:0b:cc:35:96:0c:18:5d:1c:
        ab:ab:89:59:f0:21:8a:b1:f1:e9:c4:61:29:cc:63:2d:
        db:c1:fc:ce:69:64:86:3a:e2:69:89:4e:53:35:24:b5
    Fingerprint (SHA-256):
        37:98:D4:37:E2:BE:4F:91:8B:10:D9:E7:74:15:F0:72:D8:41:62:1A:44:31:8A:A2:87:E3:2F:E8:25:52:8E:5A
    Fingerprint (SHA1):
        07:FB:80:30:04:28:90:A0:8C:FD:0D:DB:95:62:A8:1A:E2:F7:10:4B


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #4959: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags -d UserDB -pp   -f    -t Root.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #4960: BridgeWithAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185363 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4961: BridgeWithAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #4962: BridgeWithAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #4963: BridgeWithAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185364 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4964: BridgeWithAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #4965: BridgeWithAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #4966: BridgeWithAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4967: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 519185365 -7 Bridge@Army  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4968: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4969: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 519185366 -7 Bridge@Navy  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4970: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4971: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #4972: BridgeWithAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4973: BridgeWithAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4974: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 519185367   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-Bridge-519185139.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4975: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4976: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4977: BridgeWithAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #4978: BridgeWithAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 519185368   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4979: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4980: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp       -t Army.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #4981: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp       -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #4982: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185364 (0x1ef223d4)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 19:38:46 2017
            Not After : Thu May 19 19:38:46 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d9:87:51:8b:3e:55:40:08:37:a1:66:f7:c0:f3:72:6c:
                    ff:c3:aa:f3:57:12:ec:53:cd:a0:07:b9:f4:f3:83:9c:
                    3d:e6:4c:91:ef:b7:bc:a8:58:4f:8d:c5:82:f0:d5:2a:
                    07:cc:95:46:2a:fc:eb:f9:51:89:3e:44:e5:a0:ee:4a:
                    47:05:6f:f6:0e:42:f3:d5:d5:56:42:a9:98:12:b9:74:
                    e5:97:34:b7:2d:df:dc:35:da:38:e3:2e:78:07:19:60:
                    35:b5:7e:3c:0d:3e:a9:fc:cc:b2:81:f2:6f:24:93:db:
                    fe:36:53:79:7c:0a:7f:6d:ea:2c:68:7f:60:b5:21:d2:
                    d7:12:54:86:5b:14:e7:b7:58:84:fa:0f:7d:4f:5e:4b:
                    21:dc:de:32:3d:e7:a7:9a:28:3c:16:69:96:6e:69:c6:
                    5a:8c:ce:9e:5c:e1:99:91:1d:5b:55:13:74:4c:6d:b2:
                    8c:03:23:e1:50:35:f2:a0:c0:ab:c7:41:eb:6a:73:1c:
                    7d:7b:0c:28:81:02:6a:df:19:34:2a:76:62:a4:93:bb:
                    c2:04:e8:a0:d2:07:8d:b4:4c:a2:cd:f2:d6:62:3d:55:
                    60:7f:a0:ce:4c:93:c3:9a:b5:15:a7:9f:cb:2e:5c:10:
                    d8:39:91:b4:98:cc:a9:35:61:da:6e:d9:d0:29:58:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        11:b7:2d:db:bc:2c:cd:8a:71:14:79:4b:b6:ca:ea:a1:
        0b:46:9a:cb:0d:55:df:fc:5c:53:7c:d2:5a:a9:86:54:
        32:62:b9:73:28:d3:b8:49:80:05:f1:30:7c:c9:15:fe:
        5d:ac:f2:4d:c8:3e:d0:93:cb:c0:22:f3:db:36:90:56:
        77:56:37:21:e8:83:4a:c0:95:54:7c:04:7b:8a:49:db:
        83:49:ef:d5:64:a2:13:ff:f7:3b:86:d3:3c:7e:3a:ba:
        42:05:0e:e5:71:d2:ed:33:af:d6:06:30:f8:38:7d:2f:
        bd:8c:24:e9:dc:f8:75:a5:b1:c7:59:c7:44:dd:8e:ff:
        6d:50:b6:fb:8f:03:ba:83:f1:fd:80:e7:4b:19:91:c5:
        c8:10:60:5a:c5:95:57:c5:32:a7:18:b8:da:8e:23:c0:
        6f:65:40:fd:8b:4f:40:22:d0:7d:1b:ae:6d:bc:38:59:
        02:24:57:96:9e:bb:6a:1b:27:cd:b6:11:b8:38:e0:72:
        da:ec:be:70:3f:f7:6f:f7:cc:5c:a0:c2:60:62:aa:60:
        44:29:b7:5f:24:67:44:47:7c:67:1a:2d:95:df:94:66:
        89:90:9a:37:33:65:15:93:14:6b:df:bc:8b:d4:41:78:
        7d:b8:d4:37:59:6d:0c:ea:dd:1d:b2:58:67:87:bd:5a
    Fingerprint (SHA-256):
        28:A0:77:3D:D7:E4:F6:62:59:C8:56:1D:6D:9B:57:1E:DA:E6:8E:6F:22:69:19:60:E9:5F:ED:6B:71:F7:DE:BE
    Fingerprint (SHA1):
        E7:F7:BB:CF:C9:B5:41:B6:8B:22:E4:22:16:FA:9F:75:75:78:BD:C3


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4983: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185364 (0x1ef223d4)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 19:38:46 2017
            Not After : Thu May 19 19:38:46 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d9:87:51:8b:3e:55:40:08:37:a1:66:f7:c0:f3:72:6c:
                    ff:c3:aa:f3:57:12:ec:53:cd:a0:07:b9:f4:f3:83:9c:
                    3d:e6:4c:91:ef:b7:bc:a8:58:4f:8d:c5:82:f0:d5:2a:
                    07:cc:95:46:2a:fc:eb:f9:51:89:3e:44:e5:a0:ee:4a:
                    47:05:6f:f6:0e:42:f3:d5:d5:56:42:a9:98:12:b9:74:
                    e5:97:34:b7:2d:df:dc:35:da:38:e3:2e:78:07:19:60:
                    35:b5:7e:3c:0d:3e:a9:fc:cc:b2:81:f2:6f:24:93:db:
                    fe:36:53:79:7c:0a:7f:6d:ea:2c:68:7f:60:b5:21:d2:
                    d7:12:54:86:5b:14:e7:b7:58:84:fa:0f:7d:4f:5e:4b:
                    21:dc:de:32:3d:e7:a7:9a:28:3c:16:69:96:6e:69:c6:
                    5a:8c:ce:9e:5c:e1:99:91:1d:5b:55:13:74:4c:6d:b2:
                    8c:03:23:e1:50:35:f2:a0:c0:ab:c7:41:eb:6a:73:1c:
                    7d:7b:0c:28:81:02:6a:df:19:34:2a:76:62:a4:93:bb:
                    c2:04:e8:a0:d2:07:8d:b4:4c:a2:cd:f2:d6:62:3d:55:
                    60:7f:a0:ce:4c:93:c3:9a:b5:15:a7:9f:cb:2e:5c:10:
                    d8:39:91:b4:98:cc:a9:35:61:da:6e:d9:d0:29:58:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        11:b7:2d:db:bc:2c:cd:8a:71:14:79:4b:b6:ca:ea:a1:
        0b:46:9a:cb:0d:55:df:fc:5c:53:7c:d2:5a:a9:86:54:
        32:62:b9:73:28:d3:b8:49:80:05:f1:30:7c:c9:15:fe:
        5d:ac:f2:4d:c8:3e:d0:93:cb:c0:22:f3:db:36:90:56:
        77:56:37:21:e8:83:4a:c0:95:54:7c:04:7b:8a:49:db:
        83:49:ef:d5:64:a2:13:ff:f7:3b:86:d3:3c:7e:3a:ba:
        42:05:0e:e5:71:d2:ed:33:af:d6:06:30:f8:38:7d:2f:
        bd:8c:24:e9:dc:f8:75:a5:b1:c7:59:c7:44:dd:8e:ff:
        6d:50:b6:fb:8f:03:ba:83:f1:fd:80:e7:4b:19:91:c5:
        c8:10:60:5a:c5:95:57:c5:32:a7:18:b8:da:8e:23:c0:
        6f:65:40:fd:8b:4f:40:22:d0:7d:1b:ae:6d:bc:38:59:
        02:24:57:96:9e:bb:6a:1b:27:cd:b6:11:b8:38:e0:72:
        da:ec:be:70:3f:f7:6f:f7:cc:5c:a0:c2:60:62:aa:60:
        44:29:b7:5f:24:67:44:47:7c:67:1a:2d:95:df:94:66:
        89:90:9a:37:33:65:15:93:14:6b:df:bc:8b:d4:41:78:
        7d:b8:d4:37:59:6d:0c:ea:dd:1d:b2:58:67:87:bd:5a
    Fingerprint (SHA-256):
        28:A0:77:3D:D7:E4:F6:62:59:C8:56:1D:6D:9B:57:1E:DA:E6:8E:6F:22:69:19:60:E9:5F:ED:6B:71:F7:DE:BE
    Fingerprint (SHA1):
        E7:F7:BB:CF:C9:B5:41:B6:8B:22:E4:22:16:FA:9F:75:75:78:BD:C3


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #4984: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #4985: BridgeWithHalfAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185369 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4986: BridgeWithHalfAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #4987: BridgeWithHalfAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #4988: BridgeWithHalfAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185370 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #4989: BridgeWithHalfAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #4990: BridgeWithHalfAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #4991: BridgeWithHalfAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4992: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 519185371 -7 Bridge@Army  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4993: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4994: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 519185372 -7 Bridge@Navy  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #4995: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #4996: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #4997: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #4998: BridgeWithHalfAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #4999: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 519185373   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-Bridge-519185140.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #5000: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5001: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #5002: BridgeWithHalfAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5003: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 519185374   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5004: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5005: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #5006: BridgeWithHalfAIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5007: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 519185375   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-BridgeNavy-519185141.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #5008: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5009: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #5010: BridgeWithHalfAIA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5011: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 519185376   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5012: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5013: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp       -t Army.der
vfychain -d EE1DB -pp -vv       EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #5014: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp       -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #5015: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185370 (0x1ef223da)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 19:39:47 2017
            Not After : Thu May 19 19:39:47 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:01:75:1f:9e:5e:31:1a:99:a7:50:2e:46:18:8e:40:
                    bd:e0:7d:9e:48:5e:5e:54:49:83:82:95:8a:c5:c0:05:
                    14:57:14:46:78:8d:44:74:02:69:56:96:a5:ed:27:77:
                    ef:a0:41:cf:4d:84:15:33:ef:6b:43:b3:25:12:04:03:
                    85:88:03:ab:c3:c7:ff:62:c5:23:67:7e:5e:45:a7:c8:
                    7e:ca:d1:d6:de:df:8c:68:6b:2e:fd:ba:b4:a2:97:22:
                    99:13:9f:5e:09:11:e2:b2:9a:63:11:ff:fc:0f:24:e8:
                    a5:cc:c0:41:ac:dd:f8:0d:ca:67:fc:0f:39:7f:9b:87:
                    e5:3f:90:5e:a1:2f:09:81:f6:e3:1e:bd:d8:dd:32:83:
                    ce:8c:e0:62:4d:b2:a4:a0:72:0d:11:51:67:be:ab:18:
                    1e:6b:dd:85:8c:02:7d:ed:3b:1f:fb:d9:fa:02:5d:8c:
                    b8:60:f2:25:e6:3f:be:29:ec:64:f0:59:3b:35:6d:0f:
                    30:34:bd:25:d2:5d:a1:f5:17:da:08:69:8c:06:02:a9:
                    49:8e:57:63:e1:2b:a0:cf:12:6a:c2:ee:d5:a3:b5:50:
                    79:ff:be:09:12:bb:17:eb:57:91:64:83:f7:93:27:93:
                    e6:ca:a9:a1:b4:6e:d0:ac:f4:04:9b:09:07:fd:93:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        74:bb:d9:b1:2b:62:4c:1b:b5:95:b7:8e:83:34:a3:d8:
        87:4a:c5:76:34:69:f5:7e:77:3e:14:eb:25:19:ac:35:
        f9:5b:d6:c4:40:8d:a1:47:d8:2d:d1:1c:fa:93:43:f1:
        01:d0:17:aa:83:ac:6f:71:cf:56:34:bc:9a:55:af:45:
        08:ce:1c:87:9a:35:02:76:70:32:53:f9:a0:de:68:df:
        69:d3:51:ae:43:10:6b:14:a4:bb:fb:8d:52:44:99:4a:
        3d:68:19:fa:6b:f1:1c:33:8b:58:d1:f8:53:22:c7:d0:
        27:41:fa:0b:72:43:98:86:f3:d3:71:b2:2e:cd:63:0c:
        ab:7a:79:b6:78:57:e9:7f:d0:04:3f:38:5b:f2:08:77:
        be:e6:fb:7f:4c:5d:cf:b6:84:3f:ca:15:7a:cd:65:33:
        97:71:f5:8d:20:79:66:9e:05:34:39:55:ee:4d:02:28:
        1e:89:f9:16:e9:42:83:6a:59:b3:03:7d:93:8c:ce:64:
        57:f2:a0:70:9f:d0:9e:0d:6b:42:e9:24:9b:4a:a9:0b:
        6c:bd:91:ff:c1:c2:04:e6:3f:7a:25:17:9c:6a:49:fe:
        aa:66:31:75:1c:0c:37:9e:08:93:25:fb:17:a5:4f:c4:
        ec:30:d3:da:b1:c2:31:ab:cc:85:72:b8:5a:26:14:91
    Fingerprint (SHA-256):
        D5:07:CD:FB:47:B3:13:27:3A:34:0C:90:91:48:0C:23:E5:A6:3D:A7:DC:E5:76:4E:A3:50:EC:C9:97:0F:19:1C
    Fingerprint (SHA1):
        C1:23:7B:9B:A0:C2:E6:82:8E:85:A3:A2:BB:38:6A:4A:2C:22:FB:A0


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #5016: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185370 (0x1ef223da)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 19:39:47 2017
            Not After : Thu May 19 19:39:47 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:01:75:1f:9e:5e:31:1a:99:a7:50:2e:46:18:8e:40:
                    bd:e0:7d:9e:48:5e:5e:54:49:83:82:95:8a:c5:c0:05:
                    14:57:14:46:78:8d:44:74:02:69:56:96:a5:ed:27:77:
                    ef:a0:41:cf:4d:84:15:33:ef:6b:43:b3:25:12:04:03:
                    85:88:03:ab:c3:c7:ff:62:c5:23:67:7e:5e:45:a7:c8:
                    7e:ca:d1:d6:de:df:8c:68:6b:2e:fd:ba:b4:a2:97:22:
                    99:13:9f:5e:09:11:e2:b2:9a:63:11:ff:fc:0f:24:e8:
                    a5:cc:c0:41:ac:dd:f8:0d:ca:67:fc:0f:39:7f:9b:87:
                    e5:3f:90:5e:a1:2f:09:81:f6:e3:1e:bd:d8:dd:32:83:
                    ce:8c:e0:62:4d:b2:a4:a0:72:0d:11:51:67:be:ab:18:
                    1e:6b:dd:85:8c:02:7d:ed:3b:1f:fb:d9:fa:02:5d:8c:
                    b8:60:f2:25:e6:3f:be:29:ec:64:f0:59:3b:35:6d:0f:
                    30:34:bd:25:d2:5d:a1:f5:17:da:08:69:8c:06:02:a9:
                    49:8e:57:63:e1:2b:a0:cf:12:6a:c2:ee:d5:a3:b5:50:
                    79:ff:be:09:12:bb:17:eb:57:91:64:83:f7:93:27:93:
                    e6:ca:a9:a1:b4:6e:d0:ac:f4:04:9b:09:07:fd:93:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        74:bb:d9:b1:2b:62:4c:1b:b5:95:b7:8e:83:34:a3:d8:
        87:4a:c5:76:34:69:f5:7e:77:3e:14:eb:25:19:ac:35:
        f9:5b:d6:c4:40:8d:a1:47:d8:2d:d1:1c:fa:93:43:f1:
        01:d0:17:aa:83:ac:6f:71:cf:56:34:bc:9a:55:af:45:
        08:ce:1c:87:9a:35:02:76:70:32:53:f9:a0:de:68:df:
        69:d3:51:ae:43:10:6b:14:a4:bb:fb:8d:52:44:99:4a:
        3d:68:19:fa:6b:f1:1c:33:8b:58:d1:f8:53:22:c7:d0:
        27:41:fa:0b:72:43:98:86:f3:d3:71:b2:2e:cd:63:0c:
        ab:7a:79:b6:78:57:e9:7f:d0:04:3f:38:5b:f2:08:77:
        be:e6:fb:7f:4c:5d:cf:b6:84:3f:ca:15:7a:cd:65:33:
        97:71:f5:8d:20:79:66:9e:05:34:39:55:ee:4d:02:28:
        1e:89:f9:16:e9:42:83:6a:59:b3:03:7d:93:8c:ce:64:
        57:f2:a0:70:9f:d0:9e:0d:6b:42:e9:24:9b:4a:a9:0b:
        6c:bd:91:ff:c1:c2:04:e6:3f:7a:25:17:9c:6a:49:fe:
        aa:66:31:75:1c:0c:37:9e:08:93:25:fb:17:a5:4f:c4:
        ec:30:d3:da:b1:c2:31:ab:cc:85:72:b8:5a:26:14:91
    Fingerprint (SHA-256):
        D5:07:CD:FB:47:B3:13:27:3A:34:0C:90:91:48:0C:23:E5:A6:3D:A7:DC:E5:76:4E:A3:50:EC:C9:97:0F:19:1C
    Fingerprint (SHA1):
        C1:23:7B:9B:A0:C2:E6:82:8E:85:A3:A2:BB:38:6A:4A:2C:22:FB:A0


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #5017: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der BridgeArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=EE2 EE,O=EE2,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA2 Intermediate,O=CA2,C=US
Returned value is 1, expected result is fail
chains.sh: #5018: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Army.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185369 (0x1ef223d9)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Fri May 19 19:39:32 2017
            Not After : Thu May 19 19:39:32 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b3:e3:10:86:98:b0:df:2f:ed:61:aa:5e:c9:46:87:49:
                    e7:6d:5c:53:4d:26:f7:23:86:aa:f4:03:cc:9f:44:50:
                    7e:e2:f5:95:c3:e3:04:72:0a:ef:ea:41:4c:3d:1e:7c:
                    52:83:95:dc:30:e5:33:77:6f:f2:54:4f:31:da:c5:32:
                    b7:58:70:18:15:b3:ef:39:fa:6e:b4:5c:a4:6c:91:bf:
                    1d:e8:6d:d0:ca:b4:17:10:d9:ec:44:45:8e:52:87:fe:
                    b1:03:30:c3:35:00:17:78:45:4a:0b:7b:ea:ce:58:03:
                    28:09:ab:e6:3f:24:ac:51:b8:8b:52:5b:c8:65:6e:a2:
                    52:66:96:09:ed:10:03:22:87:ee:41:61:bf:59:0d:52:
                    1a:3b:78:8b:7c:81:92:09:29:db:d3:5e:1b:16:3c:fe:
                    9f:68:8f:bd:10:8f:7a:95:57:d7:5d:0a:b5:d6:0a:5e:
                    ca:71:ca:58:9d:8d:de:bc:76:f7:bd:3e:ad:f2:4f:fc:
                    ae:ea:58:79:27:ed:2f:31:39:22:a9:86:10:6c:52:3a:
                    22:18:fd:f6:22:d6:df:c4:4f:0e:3d:c2:3f:ce:73:81:
                    9c:65:8b:db:1e:58:88:79:9a:0b:d9:b4:47:b6:74:1e:
                    c8:c8:bd:1f:b7:4e:67:67:4f:24:8a:8b:62:7c:95:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        59:44:07:05:02:df:c1:c2:b7:66:0a:10:d9:f5:5e:87:
        48:56:07:1e:64:11:47:d9:29:2a:12:37:d4:6b:ca:d1:
        5a:3b:a9:f8:47:fa:e1:94:d7:22:e0:cd:de:a8:01:94:
        42:41:15:f1:36:94:2e:5e:41:16:4d:b4:c7:9f:43:72:
        68:0b:45:6a:49:56:9b:25:5f:be:2c:88:7e:58:ff:21:
        d2:61:08:fc:d7:21:1d:23:2b:2a:a5:e9:4a:94:ac:02:
        d5:c7:8d:99:4b:c4:17:8d:13:2d:a8:43:a3:e7:ca:33:
        3c:eb:27:07:b9:96:66:36:d3:e7:f9:8f:89:6b:6b:53:
        13:a5:dc:40:d7:37:5c:6d:d8:60:7b:48:ac:d2:94:c5:
        ed:82:0f:b8:5d:2d:16:f5:f6:49:ab:1b:6d:12:63:7f:
        57:84:52:15:0d:c8:0c:77:ad:46:cf:57:69:ba:ef:70:
        d5:a6:d9:4a:02:c3:fb:9d:b3:df:4a:18:05:f3:64:56:
        21:b2:24:03:13:17:1f:0b:b2:35:93:af:12:1a:f8:51:
        28:c9:b7:4b:f3:55:f9:dd:5a:aa:7c:04:5d:bc:ca:0d:
        b8:47:ee:1a:26:6d:fe:f0:fe:b8:f1:eb:db:01:a5:19:
        e0:5f:5b:69:bd:f7:dc:33:00:c6:9c:c4:25:a0:0d:87
    Fingerprint (SHA-256):
        0A:3C:67:47:62:C2:B3:56:51:FE:98:03:3D:0F:D5:1C:60:5C:D4:FE:6E:38:C6:3B:05:00:2F:26:A6:A7:B4:99
    Fingerprint (SHA1):
        1F:1B:EA:0C:EF:4B:A6:E7:A9:B1:C4:16:AB:F7:FD:C8:F9:0E:83:10


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #5019: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der CA2Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185370 (0x1ef223da)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 19:39:47 2017
            Not After : Thu May 19 19:39:47 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:01:75:1f:9e:5e:31:1a:99:a7:50:2e:46:18:8e:40:
                    bd:e0:7d:9e:48:5e:5e:54:49:83:82:95:8a:c5:c0:05:
                    14:57:14:46:78:8d:44:74:02:69:56:96:a5:ed:27:77:
                    ef:a0:41:cf:4d:84:15:33:ef:6b:43:b3:25:12:04:03:
                    85:88:03:ab:c3:c7:ff:62:c5:23:67:7e:5e:45:a7:c8:
                    7e:ca:d1:d6:de:df:8c:68:6b:2e:fd:ba:b4:a2:97:22:
                    99:13:9f:5e:09:11:e2:b2:9a:63:11:ff:fc:0f:24:e8:
                    a5:cc:c0:41:ac:dd:f8:0d:ca:67:fc:0f:39:7f:9b:87:
                    e5:3f:90:5e:a1:2f:09:81:f6:e3:1e:bd:d8:dd:32:83:
                    ce:8c:e0:62:4d:b2:a4:a0:72:0d:11:51:67:be:ab:18:
                    1e:6b:dd:85:8c:02:7d:ed:3b:1f:fb:d9:fa:02:5d:8c:
                    b8:60:f2:25:e6:3f:be:29:ec:64:f0:59:3b:35:6d:0f:
                    30:34:bd:25:d2:5d:a1:f5:17:da:08:69:8c:06:02:a9:
                    49:8e:57:63:e1:2b:a0:cf:12:6a:c2:ee:d5:a3:b5:50:
                    79:ff:be:09:12:bb:17:eb:57:91:64:83:f7:93:27:93:
                    e6:ca:a9:a1:b4:6e:d0:ac:f4:04:9b:09:07:fd:93:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        74:bb:d9:b1:2b:62:4c:1b:b5:95:b7:8e:83:34:a3:d8:
        87:4a:c5:76:34:69:f5:7e:77:3e:14:eb:25:19:ac:35:
        f9:5b:d6:c4:40:8d:a1:47:d8:2d:d1:1c:fa:93:43:f1:
        01:d0:17:aa:83:ac:6f:71:cf:56:34:bc:9a:55:af:45:
        08:ce:1c:87:9a:35:02:76:70:32:53:f9:a0:de:68:df:
        69:d3:51:ae:43:10:6b:14:a4:bb:fb:8d:52:44:99:4a:
        3d:68:19:fa:6b:f1:1c:33:8b:58:d1:f8:53:22:c7:d0:
        27:41:fa:0b:72:43:98:86:f3:d3:71:b2:2e:cd:63:0c:
        ab:7a:79:b6:78:57:e9:7f:d0:04:3f:38:5b:f2:08:77:
        be:e6:fb:7f:4c:5d:cf:b6:84:3f:ca:15:7a:cd:65:33:
        97:71:f5:8d:20:79:66:9e:05:34:39:55:ee:4d:02:28:
        1e:89:f9:16:e9:42:83:6a:59:b3:03:7d:93:8c:ce:64:
        57:f2:a0:70:9f:d0:9e:0d:6b:42:e9:24:9b:4a:a9:0b:
        6c:bd:91:ff:c1:c2:04:e6:3f:7a:25:17:9c:6a:49:fe:
        aa:66:31:75:1c:0c:37:9e:08:93:25:fb:17:a5:4f:c4:
        ec:30:d3:da:b1:c2:31:ab:cc:85:72:b8:5a:26:14:91
    Fingerprint (SHA-256):
        D5:07:CD:FB:47:B3:13:27:3A:34:0C:90:91:48:0C:23:E5:A6:3D:A7:DC:E5:76:4E:A3:50:EC:C9:97:0F:19:1C
    Fingerprint (SHA1):
        C1:23:7B:9B:A0:C2:E6:82:8E:85:A3:A2:BB:38:6A:4A:2C:22:FB:A0


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #5020: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der
vfychain -d EE1DB -pp -vv   -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185370 (0x1ef223da)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 19:39:47 2017
            Not After : Thu May 19 19:39:47 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:01:75:1f:9e:5e:31:1a:99:a7:50:2e:46:18:8e:40:
                    bd:e0:7d:9e:48:5e:5e:54:49:83:82:95:8a:c5:c0:05:
                    14:57:14:46:78:8d:44:74:02:69:56:96:a5:ed:27:77:
                    ef:a0:41:cf:4d:84:15:33:ef:6b:43:b3:25:12:04:03:
                    85:88:03:ab:c3:c7:ff:62:c5:23:67:7e:5e:45:a7:c8:
                    7e:ca:d1:d6:de:df:8c:68:6b:2e:fd:ba:b4:a2:97:22:
                    99:13:9f:5e:09:11:e2:b2:9a:63:11:ff:fc:0f:24:e8:
                    a5:cc:c0:41:ac:dd:f8:0d:ca:67:fc:0f:39:7f:9b:87:
                    e5:3f:90:5e:a1:2f:09:81:f6:e3:1e:bd:d8:dd:32:83:
                    ce:8c:e0:62:4d:b2:a4:a0:72:0d:11:51:67:be:ab:18:
                    1e:6b:dd:85:8c:02:7d:ed:3b:1f:fb:d9:fa:02:5d:8c:
                    b8:60:f2:25:e6:3f:be:29:ec:64:f0:59:3b:35:6d:0f:
                    30:34:bd:25:d2:5d:a1:f5:17:da:08:69:8c:06:02:a9:
                    49:8e:57:63:e1:2b:a0:cf:12:6a:c2:ee:d5:a3:b5:50:
                    79:ff:be:09:12:bb:17:eb:57:91:64:83:f7:93:27:93:
                    e6:ca:a9:a1:b4:6e:d0:ac:f4:04:9b:09:07:fd:93:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        74:bb:d9:b1:2b:62:4c:1b:b5:95:b7:8e:83:34:a3:d8:
        87:4a:c5:76:34:69:f5:7e:77:3e:14:eb:25:19:ac:35:
        f9:5b:d6:c4:40:8d:a1:47:d8:2d:d1:1c:fa:93:43:f1:
        01:d0:17:aa:83:ac:6f:71:cf:56:34:bc:9a:55:af:45:
        08:ce:1c:87:9a:35:02:76:70:32:53:f9:a0:de:68:df:
        69:d3:51:ae:43:10:6b:14:a4:bb:fb:8d:52:44:99:4a:
        3d:68:19:fa:6b:f1:1c:33:8b:58:d1:f8:53:22:c7:d0:
        27:41:fa:0b:72:43:98:86:f3:d3:71:b2:2e:cd:63:0c:
        ab:7a:79:b6:78:57:e9:7f:d0:04:3f:38:5b:f2:08:77:
        be:e6:fb:7f:4c:5d:cf:b6:84:3f:ca:15:7a:cd:65:33:
        97:71:f5:8d:20:79:66:9e:05:34:39:55:ee:4d:02:28:
        1e:89:f9:16:e9:42:83:6a:59:b3:03:7d:93:8c:ce:64:
        57:f2:a0:70:9f:d0:9e:0d:6b:42:e9:24:9b:4a:a9:0b:
        6c:bd:91:ff:c1:c2:04:e6:3f:7a:25:17:9c:6a:49:fe:
        aa:66:31:75:1c:0c:37:9e:08:93:25:fb:17:a5:4f:c4:
        ec:30:d3:da:b1:c2:31:ab:cc:85:72:b8:5a:26:14:91
    Fingerprint (SHA-256):
        D5:07:CD:FB:47:B3:13:27:3A:34:0C:90:91:48:0C:23:E5:A6:3D:A7:DC:E5:76:4E:A3:50:EC:C9:97:0F:19:1C
    Fingerprint (SHA1):
        C1:23:7B:9B:A0:C2:E6:82:8E:85:A3:A2:BB:38:6A:4A:2C:22:FB:A0


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #5021: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp   -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #5022: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185377 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #5023: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #5024: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #5025: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185378 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #5026: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #5027: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB CAArmyDB
certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd
chains.sh: #5028: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CAArmyReq.der
certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US"  -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CAArmyReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5029: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der  - PASSED
chains.sh: Creating certficate CAArmyArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 519185379   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5030: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army  - PASSED
chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database
certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5031: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database  - PASSED
chains.sh: Creating DB CANavyDB
certutil -N -d CANavyDB -f CANavyDB/dbpasswd
chains.sh: #5032: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CANavyReq.der
certutil -s "CN=CANavy Intermediate, O=CANavy, C=US"  -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CANavyReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5033: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der  - PASSED
chains.sh: Creating certficate CANavyNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 519185380   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5034: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate CANavyNavy.der to CANavyDB database
certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5035: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #5036: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o BridgeReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5037: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy
certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 519185381 -7 Bridge@CAArmy  --extCP --extPM < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n
OID.1.1
OID.2.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #5038: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy  - PASSED
chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5039: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeCANavy.der signed by CANavy
certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 519185382 -7 Bridge@CANavy  --extCP --extPM < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n
OID.2.1
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #5040: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy  - PASSED
chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5041: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7
chains.sh: #5042: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #5043: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5044: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 519185383   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5045: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5046: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #5047: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5048: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 519185384   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5049: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5050: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #5051: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5052: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 519185385   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5053: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5054: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #5055: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5056: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 519185386   --extCP < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
	1 - CPS Pointer qualifier
	2 - User notice qualifier
	Any other number to finish
		Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5057: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5058: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.0  -t Army.der
vfychain  -pp -vv      -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5059: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.1  -t Army.der
vfychain  -pp -vv      -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185377 (0x1ef223e1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Fri May 19 19:40:54 2017
            Not After : Thu May 19 19:40:54 2067
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:f0:52:64:26:67:40:1e:76:52:ef:7d:ae:1a:af:df:
                    ec:90:84:e1:e9:fa:0e:c1:89:76:47:0d:a3:0c:8d:96:
                    ff:69:32:3a:5e:16:82:23:94:39:83:0b:c8:29:17:e5:
                    2f:b8:aa:e6:be:29:fa:0f:5f:0b:93:62:b3:15:4c:ba:
                    7b:de:a2:eb:cd:2c:d7:ed:fb:e0:2d:be:42:66:5a:14:
                    8c:7f:f0:43:9e:cc:9d:5f:7d:b8:81:38:4f:68:9f:93:
                    02:03:5e:7c:90:18:26:95:fb:35:05:6a:e5:07:6c:c9:
                    d6:3d:81:ff:ad:49:c9:d6:6e:6e:54:3f:93:61:b7:73:
                    f9:6f:94:a1:f3:b5:22:11:16:f4:ce:40:de:d4:79:d1:
                    f3:9b:2d:38:2f:35:30:a2:e8:01:fb:98:d2:7f:c2:e7:
                    f6:1c:91:6c:6f:25:d1:6f:fc:aa:7a:f8:ff:80:80:ab:
                    fc:9b:c4:35:7f:ab:28:5d:37:a6:54:8d:64:3c:d0:c5:
                    ff:dc:31:c1:0a:89:aa:28:92:9d:d9:52:f2:73:a4:bf:
                    3a:80:00:af:bc:bf:6d:cd:ae:f8:77:a3:e6:d3:cf:01:
                    63:16:b2:7c:ae:3b:6c:9a:44:80:c1:7e:51:a3:fb:18:
                    c4:1d:51:65:77:e3:45:8a:84:67:b0:0c:94:8d:3e:c1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        6d:4b:d0:e7:75:02:c8:99:63:d7:71:71:20:78:a3:9b:
        cd:7f:e2:29:2f:ab:51:3f:45:e8:66:09:cd:3c:ad:cc:
        6e:5a:5f:bb:17:2b:14:97:ac:19:54:54:ff:ea:fc:06:
        de:74:ea:23:82:ca:4a:09:cc:97:25:56:28:7b:98:69:
        c6:e1:fe:bd:0e:ba:af:b6:17:f9:d6:be:a3:aa:c7:a0:
        db:fd:a9:f1:2a:53:c5:55:81:26:ac:a2:20:47:b9:26:
        bf:d8:f2:bd:b9:ba:37:e7:41:67:a1:a5:d8:78:ae:63:
        80:1c:08:a5:c7:2f:cc:ae:ea:b3:72:40:b5:03:f2:c9:
        4f:be:0b:13:be:d0:9f:72:99:b9:97:47:dd:04:1c:9d:
        d7:23:67:60:c7:80:ba:60:42:56:85:86:42:15:83:d6:
        8d:e4:a9:5c:9e:9b:9c:32:82:a1:bd:de:84:bb:00:63:
        b7:5a:02:3d:9b:10:07:2a:a9:4b:b1:bf:eb:3f:d7:90:
        d7:1e:28:72:8f:39:08:ff:14:e8:de:39:80:b0:ff:f7:
        d4:79:a4:dc:fa:0a:6c:98:c0:0e:f8:d2:3b:04:53:f3:
        ee:c6:2c:a0:b0:94:3b:c5:1a:72:52:88:6d:37:01:2b:
        02:e4:bd:a3:e8:e9:49:db:71:24:37:b7:65:d7:29:95
    Fingerprint (SHA-256):
        A0:FB:42:37:99:C9:47:38:14:F1:46:8F:C9:C2:24:99:C7:0C:68:66:13:03:2C:53:27:01:B7:7A:A6:40:E3:72
    Fingerprint (SHA1):
        D2:33:32:F2:A2:AE:F5:1F:81:62:9B:E7:0F:43:FF:E5:B7:59:40:DA


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US"
Returned value is 0, expected result is pass
chains.sh: #5060: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.0  -t Army.der
vfychain  -pp -vv      -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5061: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.1  -t Army.der
vfychain  -pp -vv      -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5062: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.0  -t Navy.der
vfychain  -pp -vv      -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5063: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.1  -t Navy.der
vfychain  -pp -vv      -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5064: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.0  -t Navy.der
vfychain  -pp -vv      -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5065: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.1  -t Navy.der
vfychain  -pp -vv      -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5066: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.0  -t Navy.der
vfychain  -pp -vv      -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5067: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.1  -t Navy.der
vfychain  -pp -vv      -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5068: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.0  -t Navy.der
vfychain  -pp -vv      -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185378 (0x1ef223e2)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Fri May 19 19:41:04 2017
            Not After : Thu May 19 19:41:04 2067
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e5:51:18:20:c2:e6:83:da:bc:0b:74:21:d4:57:94:d7:
                    cb:06:52:7a:72:09:cc:f9:25:5c:10:61:2f:c7:28:fa:
                    b5:e2:98:de:b0:ec:b2:7a:f6:65:6c:28:81:fb:46:70:
                    df:87:81:ec:78:84:d1:ce:b5:36:08:41:eb:b4:ca:35:
                    16:22:9c:fe:38:c7:1a:89:4a:17:7f:1e:d4:6d:61:d0:
                    66:ad:bd:9b:b7:2b:99:00:0f:66:4d:dc:b5:6a:d3:18:
                    9a:13:91:84:81:56:d7:36:4f:f5:b0:10:16:be:91:e1:
                    b3:12:b6:a4:bf:7b:b5:c0:a0:d3:cc:26:ad:b7:2d:f0:
                    3a:c1:10:16:e9:2b:19:7c:a3:a4:d5:ba:92:60:ed:cd:
                    8d:c9:72:96:0f:fe:79:57:7f:27:59:29:bb:29:25:11:
                    1d:3d:59:c9:29:c1:54:d4:7e:a6:00:3f:5d:2b:8d:50:
                    3f:da:65:15:74:0a:dc:fa:0a:17:3b:b4:8b:d0:0b:fd:
                    a4:90:c7:ca:9f:af:eb:ea:23:78:f1:9b:8b:7d:61:5d:
                    67:9e:3f:ec:13:13:a3:9f:14:66:b3:45:8d:c0:4d:90:
                    69:4e:0e:5d:33:33:5a:3d:14:1c:69:eb:2c:72:4a:98:
                    82:de:0b:8b:a6:27:37:f7:22:cd:f1:ab:b1:33:0a:43
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        50:41:90:6c:78:19:86:36:15:41:20:53:55:cc:57:88:
        83:04:53:e9:b4:40:84:92:47:a8:61:66:ab:33:9f:7d:
        8f:03:0a:69:07:46:97:09:26:7e:89:11:6c:d0:c4:26:
        3a:c5:20:ce:fa:8c:40:98:9a:50:e4:61:47:9d:09:37:
        f0:d1:28:90:ca:eb:50:2f:31:e0:31:2c:81:6c:92:dd:
        db:ee:3d:34:55:4b:cc:cd:dd:0c:54:6c:9a:65:2d:e6:
        b2:06:15:c6:17:db:99:25:85:44:54:30:0d:79:59:5d:
        bc:5d:92:54:f1:59:f0:6a:d3:69:06:93:d3:b5:fb:96:
        22:4a:95:d1:93:57:33:5a:b5:bf:24:27:3e:d9:27:49:
        2a:ea:c0:75:d1:e1:7a:46:2b:6b:0c:63:fa:98:5c:c7:
        87:b1:25:2b:57:0d:60:60:4c:c3:8b:6a:8b:82:ad:bd:
        52:e6:3d:6c:e2:3d:bd:fe:5f:b8:6f:d9:0c:92:1e:c7:
        d1:56:55:39:2e:00:97:96:81:e8:6b:70:51:d7:94:a9:
        26:a8:76:15:e2:50:cc:98:ea:64:e4:ef:4e:52:a0:1e:
        95:8b:ab:95:dc:2a:c8:0d:56:03:e7:f8:bb:03:ac:10:
        83:67:e2:44:a5:60:73:5b:26:98:c3:55:02:bb:0a:ae
    Fingerprint (SHA-256):
        EC:D8:08:F6:C8:D1:E4:A2:D8:74:8B:32:FA:3B:95:CC:96:AD:B1:DB:4D:E8:E2:A3:E2:C7:5E:3D:08:7C:74:D4
    Fingerprint (SHA1):
        5F:EC:C7:47:46:11:D3:62:62:3E:21:8C:64:5D:B5:5E:17:BA:7F:7B


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US"
Returned value is 0, expected result is pass
chains.sh: #5069: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.1  -t Navy.der
vfychain  -pp -vv      -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5070: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags  -pp      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.0  -t Army.der
vfychain  -pp -vv      -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5071: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.1  -t Army.der
vfychain  -pp -vv      -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5072: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.0  -t Army.der
vfychain  -pp -vv      -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5073: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.1  -t Army.der
vfychain  -pp -vv      -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #5074: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags  -pp      -o OID.2.1  -t Army.der - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #5075: RealCerts: Creating DB AllDB  - PASSED
chains.sh: Importing certificate TestCA.ca.cert to AllDB database
certutil -A -n TestCA.ca  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestCA.ca.cert
chains.sh: #5076: RealCerts: Importing certificate TestCA.ca.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser50.cert to AllDB database
certutil -A -n TestUser50  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestUser50.cert
chains.sh: #5077: RealCerts: Importing certificate TestUser50.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser51.cert to AllDB database
certutil -A -n TestUser51  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestUser51.cert
chains.sh: #5078: RealCerts: Importing certificate TestUser51.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalRootCA.cert to AllDB database
certutil -A -n PayPalRootCA  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/PayPalRootCA.cert
chains.sh: #5079: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalICA.cert to AllDB database
certutil -A -n PayPalICA  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/PayPalICA.cert
chains.sh: #5080: RealCerts: Importing certificate PayPalICA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalEE.cert to AllDB database
certutil -A -n PayPalEE  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/PayPalEE.cert
chains.sh: #5081: RealCerts: Importing certificate PayPalEE.cert to AllDB database  - PASSED
chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database
certutil -A -n BrAirWaysBadSig  -t "" -d AllDB -f AllDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/BrAirWaysBadSig.cert
chains.sh: #5082: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  TestUser50.cert with flags -d AllDB -pp      
vfychain -d AllDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestUser50.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Feb 20 16:25:05 2013
            Not After : Tue Feb 20 16:25:05 2063
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a:
                    02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75:
                    28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c:
                    90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be:
                    92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8:
                    e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2:
                    7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1:
                    cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59:
        d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa:
        b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8:
        8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2:
        b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb:
        be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9:
        4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd:
        37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65
    Fingerprint (SHA-256):
        E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65
    Fingerprint (SHA1):
        1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #5083: RealCerts: Verifying certificate(s)  TestUser50.cert with flags -d AllDB -pp       - PASSED
chains.sh: Verifying certificate(s)  TestUser51.cert with flags -d AllDB -pp      
vfychain -d AllDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/TestUser51.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Feb 20 16:25:05 2013
            Not After : Tue Feb 20 16:25:05 2063
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a:
                    02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75:
                    28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c:
                    90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be:
                    92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8:
                    e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2:
                    7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1:
                    cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59:
        d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa:
        b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8:
        8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2:
        b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb:
        be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9:
        4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd:
        37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65
    Fingerprint (SHA-256):
        E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65
    Fingerprint (SHA1):
        1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #5084: RealCerts: Verifying certificate(s)  TestUser51.cert with flags -d AllDB -pp       - PASSED
chains.sh: Verifying certificate(s)  PayPalEE.cert with flags -d AllDB -pp      -o OID.2.16.840.1.113733.1.7.23.6 
vfychain -d AllDB -pp -vv      -o OID.2.16.840.1.113733.1.7.23.6  /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/PayPalEE.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            18:da:d1:9e:26:7d:e8:bb:4a:21:58:cd:cc:6b:3b:4a
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=VeriSign Class 3 Public Primary Certification Authority -
             G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ver
            iSign Trust Network,O="VeriSign, Inc.",C=US"
        Validity:
            Not Before: Wed Nov 08 00:00:00 2006
            Not After : Wed Jul 16 23:59:59 2036
        Subject: "CN=VeriSign Class 3 Public Primary Certification Authority 
            - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve
            riSign Trust Network,O="VeriSign, Inc.",C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc:
                    7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64:
                    85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42:
                    b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec:
                    ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3:
                    62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b:
                    9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f:
                    e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db:
                    7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af:
                    1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a:
                    b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7:
                    ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74:
                    24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4:
                    8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95:
                    ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f:
                    73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Critical: True
            Usages: Certificate Signing
                    CRL Signing

            Name: OID.1.3.6.1.5.5.7.1.12
            Data: Sequence {
                [1]: {
                    [0]: {
                        Sequence {
                            Sequence {
                                Sequence {
                                    "image/gif"
                                    Sequence {
                                        Sequence {
                                            Sequence {
                                                SHA-1
                                            }
                                            8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf:
                                            80:6a:d4:48:18:2c:7b:19:2e
                                        }
                                    }
                                    Sequence {
                                        "http://logo.verisign.com/vslogo.gif"
                                    }
                                }
                            }
                        }
                    }
                }
            }

            Name: Certificate Subject Key ID
            Data:
                7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02:
                af:33:31:33

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        93:24:4a:30:5f:62:cf:d8:1a:98:2f:3d:ea:dc:99:2d:
        bd:77:f6:a5:79:22:38:ec:c4:a7:a0:78:12:ad:62:0e:
        45:70:64:c5:e7:97:66:2d:98:09:7e:5f:af:d6:cc:28:
        65:f2:01:aa:08:1a:47:de:f9:f9:7c:92:5a:08:69:20:
        0d:d9:3e:6d:6e:3c:0d:6e:d8:e6:06:91:40:18:b9:f8:
        c1:ed:df:db:41:aa:e0:96:20:c9:cd:64:15:38:81:c9:
        94:ee:a2:84:29:0b:13:6f:8e:db:0c:dd:25:02:db:a4:
        8b:19:44:d2:41:7a:05:69:4a:58:4f:60:ca:7e:82:6a:
        0b:02:aa:25:17:39:b5:db:7f:e7:84:65:2a:95:8a:bd:
        86:de:5e:81:16:83:2d:10:cc:de:fd:a8:82:2a:6d:28:
        1f:0d:0b:c4:e5:e7:1a:26:19:e1:f4:11:6f:10:b5:95:
        fc:e7:42:05:32:db:ce:9d:51:5e:28:b6:9e:85:d3:5b:
        ef:a5:7d:45:40:72:8e:b7:0e:6b:0e:06:fb:33:35:48:
        71:b8:9d:27:8b:c4:65:5f:0d:86:76:9c:44:7a:f6:95:
        5c:f6:5d:32:08:33:a4:54:b6:18:3f:68:5c:f2:42:4a:
        85:38:54:83:5f:d1:e8:2c:f2:ac:11:d6:a8:ed:63:6a
    Fingerprint (SHA-256):
        9A:CF:AB:7E:43:C8:D8:80:D0:6B:26:2A:94:DE:EE:E4:B4:65:99:89:C3:D0:CA:F1:9B:AF:64:05:E4:1A:B7:DF
    Fingerprint (SHA1):
        4E:B6:D5:78:49:9B:1C:CF:5F:58:1E:AD:56:BE:3D:9B:67:44:A5:E5

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",STR
    EET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C=US,ser
    ialNumber=3014267,businessCategory=Private Organization,incorporationStat
    e=Delaware,incorporationCountry=US"
Certificate 2 Subject: "CN=Symantec Class 3 EV SSL CA - G3,OU=Symantec Trust 
    Network,O=Symantec Corporation,C=US"
Returned value is 0, expected result is pass
chains.sh: #5085: RealCerts: Verifying certificate(s)  PayPalEE.cert with flags -d AllDB -pp      -o OID.2.16.840.1.113733.1.7.23.6  - PASSED
chains.sh: Verifying certificate(s)  BrAirWaysBadSig.cert with flags -d AllDB -pp      
vfychain -d AllDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/BrAirWaysBadSig.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. BrAirWaysBadSig :
  ERROR -8181: Peer's Certificate has expired.
Returned value is 1, expected result is fail
chains.sh: #5086: RealCerts: Verifying certificate(s)  BrAirWaysBadSig.cert with flags -d AllDB -pp       - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #5087: DSA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185387 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #5088: DSA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #5089: DSA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #5090: DSA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5091: DSA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 519185388   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5092: DSA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5093: DSA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #5094: DSA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5095: DSA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 519185389   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5096: DSA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5097: DSA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #5098: DSA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5099: DSA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 519185390   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5100: DSA: Creating certficate CA2Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA2Root.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5101: DSA: Importing certificate CA2Root.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #5102: DSA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5103: DSA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 519185391   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5104: DSA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5105: DSA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #5106: DSA: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5107: DSA: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 519185392   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5108: DSA: Creating certficate CA3Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA3Root.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5109: DSA: Importing certificate CA3Root.der to CA3DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #5110: DSA: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R  -d EE3DB -f EE3DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE3Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5111: DSA: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 519185393   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5112: DSA: Creating certficate EE3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate EE3CA3.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5113: DSA: Importing certificate EE3CA3.der to EE3DB database  - PASSED
chains.sh: Creating DB CA4DB
certutil -N -d CA4DB -f CA4DB/dbpasswd
chains.sh: #5114: DSA: Creating DB CA4DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA4Req.der
certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA4Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5115: DSA: Creating Intermediate certifiate request CA4Req.der  - PASSED
chains.sh: Creating certficate CA4Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 519185394   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5116: DSA: Creating certficate CA4Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA4Root.der to CA4DB database
certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5117: DSA: Importing certificate CA4Root.der to CA4DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #5118: DSA: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R  -d EE4DB -f EE4DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE4Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5119: DSA: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA4.der signed by CA4
certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 519185395   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5120: DSA: Creating certficate EE4CA4.der signed by CA4  - PASSED
chains.sh: Importing certificate EE4CA4.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5121: DSA: Importing certificate EE4CA4.der to EE4DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #5122: DSA: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags -d AllDB -pp       -t Root.der
vfychain -d AllDB -pp -vv       EE1CA1.der CA1Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185387 (0x1ef223eb)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:42:12 2017
            Not After : Thu May 19 19:42:12 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa:
                    65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba:
                    66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7:
                    2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec:
                    c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52:
                    13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d:
                    c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74:
                    be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f:
                    3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3:
                    6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb:
                    47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61:
                    db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5:
                    7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c:
                    20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa:
                    93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32:
                    60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a:
                    42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6:
                    51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6:
                    c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d:
                    b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64:
                    b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e:
                    0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59:
                    29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b:
                    47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3:
                    1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0:
                    c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48:
                    ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92:
                    90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b:
                    56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd:
                    ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe:
                    d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba:
                    77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba:
                    0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12:
                    cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32:
                    f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
            DSA Public Key:
                Prime:
                    c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd:
                    bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08:
                    b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b:
                    a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83:
                    02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9:
                    2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8:
                    f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63:
                    76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef:
                    30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3:
                    f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f:
                    2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97:
                    ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81:
                    16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c:
                    98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9:
                    34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32:
                    aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9
                Subprime:
                    e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:
                    1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1
                Base:
                    70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:
                    ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:
                    1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:
                    92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:
                    7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:
                    3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:
                    ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:
                    1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:
                    f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:
                    89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac:
                    ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:
                    85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:
                    c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:
                    be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:
                    cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:
                    57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
                PublicValue:
                    6a:ba:fc:18:94:0f:a5:cd:1a:a2:6a:f8:5b:a8:bd:23:
                    54:92:88:5d:a2:03:c1:8c:e8:b5:e4:70:f2:ec:bc:25:
                    e3:c2:ae:4f:09:0f:8d:fb:7e:1f:13:5a:63:bf:d0:d6:
                    03:e2:7e:e7:1a:51:f9:fd:c1:9d:8f:8d:f0:59:01:3b:
                    77:ad:78:6a:39:17:69:74:02:be:82:e5:b0:1e:05:a3:
                    b0:73:67:35:f2:f0:99:1f:be:8b:97:5f:46:c3:da:17:
                    b3:54:32:7d:90:a5:2b:f4:31:ac:7d:9d:a8:6d:25:ed:
                    3d:01:19:ff:0a:65:00:b0:c5:f2:2c:20:24:34:d0:4e:
                    b9:29:0c:7e:f5:63:2b:d0:0f:95:99:c0:0e:e3:59:95:
                    1c:c2:e5:7e:c2:69:b5:03:e7:27:f6:a2:7b:de:0f:4f:
                    5f:0a:82:f6:a0:a9:52:f2:3e:a9:95:da:fd:ca:0a:d7:
                    63:65:7d:ec:25:17:30:33:d5:7e:eb:91:66:e1:44:99:
                    a2:18:f3:f6:b5:2a:fd:6c:1c:7f:8c:9e:27:e5:d5:c1:
                    cf:6f:79:74:e2:cc:a1:ed:f7:d2:9b:30:bd:e1:9f:41:
                    d0:40:37:ef:b6:6a:da:27:1b:53:87:72:cf:df:4a:41:
                    53:3e:fe:f1:ca:82:5f:2b:a4:46:d8:cf:17:8a:18:9b
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:3d:02:1d:00:97:f4:38:e6:19:b6:25:40:89:ef:94:
        eb:1a:ec:af:4c:d7:ff:c8:9b:de:a3:fb:8a:f6:57:82:
        a6:02:1c:27:57:e1:e1:f7:42:68:73:df:cf:6f:24:6b:
        10:b6:13:05:16:dc:fd:0e:c2:7d:87:09:06:ea:3a
    Fingerprint (SHA-256):
        59:33:1A:67:24:1A:4E:AC:92:10:A7:36:7A:9F:16:B4:49:9E:3D:70:CF:09:0F:F1:9F:AB:BF:8C:C7:CE:EA:80
    Fingerprint (SHA1):
        D0:97:69:59:5D:7D:E0:49:53:CE:E7:0F:E2:16:78:84:4F:C1:E0:D8


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5123: DSA: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags -d AllDB -pp       -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags -d AllDB -pp       -t Root.der
vfychain -d AllDB -pp -vv       EE2CA2.der CA2Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185387 (0x1ef223eb)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:42:12 2017
            Not After : Thu May 19 19:42:12 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa:
                    65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba:
                    66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7:
                    2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec:
                    c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52:
                    13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d:
                    c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74:
                    be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f:
                    3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3:
                    6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb:
                    47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61:
                    db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5:
                    7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c:
                    20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa:
                    93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32:
                    60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a:
                    42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6:
                    51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6:
                    c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d:
                    b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64:
                    b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e:
                    0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59:
                    29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b:
                    47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3:
                    1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0:
                    c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48:
                    ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92:
                    90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b:
                    56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd:
                    ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe:
                    d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba:
                    77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba:
                    0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12:
                    cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32:
                    f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
            DSA Public Key:
                Prime:
                    c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd:
                    bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08:
                    b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b:
                    a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83:
                    02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9:
                    2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8:
                    f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63:
                    76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef:
                    30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3:
                    f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f:
                    2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97:
                    ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81:
                    16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c:
                    98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9:
                    34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32:
                    aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9
                Subprime:
                    e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:
                    1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1
                Base:
                    70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:
                    ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:
                    1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:
                    92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:
                    7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:
                    3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:
                    ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:
                    1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:
                    f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:
                    89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac:
                    ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:
                    85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:
                    c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:
                    be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:
                    cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:
                    57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
                PublicValue:
                    6a:ba:fc:18:94:0f:a5:cd:1a:a2:6a:f8:5b:a8:bd:23:
                    54:92:88:5d:a2:03:c1:8c:e8:b5:e4:70:f2:ec:bc:25:
                    e3:c2:ae:4f:09:0f:8d:fb:7e:1f:13:5a:63:bf:d0:d6:
                    03:e2:7e:e7:1a:51:f9:fd:c1:9d:8f:8d:f0:59:01:3b:
                    77:ad:78:6a:39:17:69:74:02:be:82:e5:b0:1e:05:a3:
                    b0:73:67:35:f2:f0:99:1f:be:8b:97:5f:46:c3:da:17:
                    b3:54:32:7d:90:a5:2b:f4:31:ac:7d:9d:a8:6d:25:ed:
                    3d:01:19:ff:0a:65:00:b0:c5:f2:2c:20:24:34:d0:4e:
                    b9:29:0c:7e:f5:63:2b:d0:0f:95:99:c0:0e:e3:59:95:
                    1c:c2:e5:7e:c2:69:b5:03:e7:27:f6:a2:7b:de:0f:4f:
                    5f:0a:82:f6:a0:a9:52:f2:3e:a9:95:da:fd:ca:0a:d7:
                    63:65:7d:ec:25:17:30:33:d5:7e:eb:91:66:e1:44:99:
                    a2:18:f3:f6:b5:2a:fd:6c:1c:7f:8c:9e:27:e5:d5:c1:
                    cf:6f:79:74:e2:cc:a1:ed:f7:d2:9b:30:bd:e1:9f:41:
                    d0:40:37:ef:b6:6a:da:27:1b:53:87:72:cf:df:4a:41:
                    53:3e:fe:f1:ca:82:5f:2b:a4:46:d8:cf:17:8a:18:9b
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:3d:02:1d:00:97:f4:38:e6:19:b6:25:40:89:ef:94:
        eb:1a:ec:af:4c:d7:ff:c8:9b:de:a3:fb:8a:f6:57:82:
        a6:02:1c:27:57:e1:e1:f7:42:68:73:df:cf:6f:24:6b:
        10:b6:13:05:16:dc:fd:0e:c2:7d:87:09:06:ea:3a
    Fingerprint (SHA-256):
        59:33:1A:67:24:1A:4E:AC:92:10:A7:36:7A:9F:16:B4:49:9E:3D:70:CF:09:0F:F1:9F:AB:BF:8C:C7:CE:EA:80
    Fingerprint (SHA1):
        D0:97:69:59:5D:7D:E0:49:53:CE:E7:0F:E2:16:78:84:4F:C1:E0:D8


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #5124: DSA: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags -d AllDB -pp       -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags -d AllDB -pp       -t Root.der
vfychain -d AllDB -pp -vv       EE3CA3.der CA3Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185387 (0x1ef223eb)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:42:12 2017
            Not After : Thu May 19 19:42:12 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa:
                    65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba:
                    66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7:
                    2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec:
                    c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52:
                    13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d:
                    c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74:
                    be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f:
                    3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3:
                    6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb:
                    47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61:
                    db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5:
                    7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c:
                    20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa:
                    93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32:
                    60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a:
                    42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6:
                    51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6:
                    c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d:
                    b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64:
                    b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e:
                    0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59:
                    29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b:
                    47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3:
                    1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0:
                    c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48:
                    ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92:
                    90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b:
                    56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd:
                    ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe:
                    d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba:
                    77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba:
                    0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12:
                    cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32:
                    f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
            DSA Public Key:
                Prime:
                    c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd:
                    bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08:
                    b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b:
                    a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83:
                    02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9:
                    2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8:
                    f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63:
                    76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef:
                    30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3:
                    f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f:
                    2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97:
                    ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81:
                    16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c:
                    98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9:
                    34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32:
                    aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9
                Subprime:
                    e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:
                    1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1
                Base:
                    70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:
                    ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:
                    1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:
                    92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:
                    7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:
                    3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:
                    ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:
                    1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:
                    f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:
                    89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac:
                    ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:
                    85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:
                    c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:
                    be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:
                    cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:
                    57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
                PublicValue:
                    6a:ba:fc:18:94:0f:a5:cd:1a:a2:6a:f8:5b:a8:bd:23:
                    54:92:88:5d:a2:03:c1:8c:e8:b5:e4:70:f2:ec:bc:25:
                    e3:c2:ae:4f:09:0f:8d:fb:7e:1f:13:5a:63:bf:d0:d6:
                    03:e2:7e:e7:1a:51:f9:fd:c1:9d:8f:8d:f0:59:01:3b:
                    77:ad:78:6a:39:17:69:74:02:be:82:e5:b0:1e:05:a3:
                    b0:73:67:35:f2:f0:99:1f:be:8b:97:5f:46:c3:da:17:
                    b3:54:32:7d:90:a5:2b:f4:31:ac:7d:9d:a8:6d:25:ed:
                    3d:01:19:ff:0a:65:00:b0:c5:f2:2c:20:24:34:d0:4e:
                    b9:29:0c:7e:f5:63:2b:d0:0f:95:99:c0:0e:e3:59:95:
                    1c:c2:e5:7e:c2:69:b5:03:e7:27:f6:a2:7b:de:0f:4f:
                    5f:0a:82:f6:a0:a9:52:f2:3e:a9:95:da:fd:ca:0a:d7:
                    63:65:7d:ec:25:17:30:33:d5:7e:eb:91:66:e1:44:99:
                    a2:18:f3:f6:b5:2a:fd:6c:1c:7f:8c:9e:27:e5:d5:c1:
                    cf:6f:79:74:e2:cc:a1:ed:f7:d2:9b:30:bd:e1:9f:41:
                    d0:40:37:ef:b6:6a:da:27:1b:53:87:72:cf:df:4a:41:
                    53:3e:fe:f1:ca:82:5f:2b:a4:46:d8:cf:17:8a:18:9b
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:3d:02:1d:00:97:f4:38:e6:19:b6:25:40:89:ef:94:
        eb:1a:ec:af:4c:d7:ff:c8:9b:de:a3:fb:8a:f6:57:82:
        a6:02:1c:27:57:e1:e1:f7:42:68:73:df:cf:6f:24:6b:
        10:b6:13:05:16:dc:fd:0e:c2:7d:87:09:06:ea:3a
    Fingerprint (SHA-256):
        59:33:1A:67:24:1A:4E:AC:92:10:A7:36:7A:9F:16:B4:49:9E:3D:70:CF:09:0F:F1:9F:AB:BF:8C:C7:CE:EA:80
    Fingerprint (SHA1):
        D0:97:69:59:5D:7D:E0:49:53:CE:E7:0F:E2:16:78:84:4F:C1:E0:D8


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #5125: DSA: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags -d AllDB -pp       -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags -d AllDB -pp       -t Root.der
vfychain -d AllDB -pp -vv       EE4CA4.der CA4Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185387 (0x1ef223eb)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:42:12 2017
            Not After : Thu May 19 19:42:12 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa:
                    65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba:
                    66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7:
                    2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec:
                    c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52:
                    13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d:
                    c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74:
                    be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f:
                    3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3:
                    6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb:
                    47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61:
                    db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5:
                    7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c:
                    20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa:
                    93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32:
                    60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a:
                    42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6:
                    51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6:
                    c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d:
                    b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64:
                    b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e:
                    0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59:
                    29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b:
                    47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3:
                    1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0:
                    c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48:
                    ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92:
                    90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b:
                    56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd:
                    ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe:
                    d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba:
                    77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba:
                    0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12:
                    cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32:
                    f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
            DSA Public Key:
                Prime:
                    c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd:
                    bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08:
                    b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b:
                    a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83:
                    02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9:
                    2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8:
                    f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63:
                    76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef:
                    30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3:
                    f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f:
                    2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97:
                    ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81:
                    16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c:
                    98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9:
                    34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32:
                    aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9
                Subprime:
                    e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:
                    1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1
                Base:
                    70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:
                    ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:
                    1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:
                    92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:
                    7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:
                    3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:
                    ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:
                    1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:
                    f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:
                    89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac:
                    ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:
                    85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:
                    c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:
                    be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:
                    cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:
                    57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4
                PublicValue:
                    6a:ba:fc:18:94:0f:a5:cd:1a:a2:6a:f8:5b:a8:bd:23:
                    54:92:88:5d:a2:03:c1:8c:e8:b5:e4:70:f2:ec:bc:25:
                    e3:c2:ae:4f:09:0f:8d:fb:7e:1f:13:5a:63:bf:d0:d6:
                    03:e2:7e:e7:1a:51:f9:fd:c1:9d:8f:8d:f0:59:01:3b:
                    77:ad:78:6a:39:17:69:74:02:be:82:e5:b0:1e:05:a3:
                    b0:73:67:35:f2:f0:99:1f:be:8b:97:5f:46:c3:da:17:
                    b3:54:32:7d:90:a5:2b:f4:31:ac:7d:9d:a8:6d:25:ed:
                    3d:01:19:ff:0a:65:00:b0:c5:f2:2c:20:24:34:d0:4e:
                    b9:29:0c:7e:f5:63:2b:d0:0f:95:99:c0:0e:e3:59:95:
                    1c:c2:e5:7e:c2:69:b5:03:e7:27:f6:a2:7b:de:0f:4f:
                    5f:0a:82:f6:a0:a9:52:f2:3e:a9:95:da:fd:ca:0a:d7:
                    63:65:7d:ec:25:17:30:33:d5:7e:eb:91:66:e1:44:99:
                    a2:18:f3:f6:b5:2a:fd:6c:1c:7f:8c:9e:27:e5:d5:c1:
                    cf:6f:79:74:e2:cc:a1:ed:f7:d2:9b:30:bd:e1:9f:41:
                    d0:40:37:ef:b6:6a:da:27:1b:53:87:72:cf:df:4a:41:
                    53:3e:fe:f1:ca:82:5f:2b:a4:46:d8:cf:17:8a:18:9b
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:3d:02:1d:00:97:f4:38:e6:19:b6:25:40:89:ef:94:
        eb:1a:ec:af:4c:d7:ff:c8:9b:de:a3:fb:8a:f6:57:82:
        a6:02:1c:27:57:e1:e1:f7:42:68:73:df:cf:6f:24:6b:
        10:b6:13:05:16:dc:fd:0e:c2:7d:87:09:06:ea:3a
    Fingerprint (SHA-256):
        59:33:1A:67:24:1A:4E:AC:92:10:A7:36:7A:9F:16:B4:49:9E:3D:70:CF:09:0F:F1:9F:AB:BF:8C:C7:CE:EA:80
    Fingerprint (SHA1):
        D0:97:69:59:5D:7D:E0:49:53:CE:E7:0F:E2:16:78:84:4F:C1:E0:D8


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US"
Returned value is 0, expected result is pass
chains.sh: #5126: DSA: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags -d AllDB -pp       -t Root.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #5127: Revocation: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 10 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #5128: Revocation: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #5129: Revocation: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #5130: Revocation: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA0Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5131: Revocation: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5132: Revocation: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5133: Revocation: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #5134: Revocation: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5135: Revocation: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5136: Revocation: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5137: Revocation: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #5138: Revocation: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE11Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5139: Revocation: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5140: Revocation: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5141: Revocation: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB EE12DB
certutil -N -d EE12DB -f EE12DB/dbpasswd
chains.sh: #5142: Revocation: Creating DB EE12DB  - PASSED
chains.sh: Creating EE certifiate request EE12Req.der
certutil -s "CN=EE12 EE, O=EE12, C=US"  -R  -d EE12DB -f EE12DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE12Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5143: Revocation: Creating EE certifiate request EE12Req.der  - PASSED
chains.sh: Creating certficate EE12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5144: Revocation: Creating certficate EE12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE12CA1.der to EE12DB database
certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5145: Revocation: Importing certificate EE12CA1.der to EE12DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #5146: Revocation: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5147: Revocation: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5148: Revocation: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5149: Revocation: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #5150: Revocation: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE21Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5151: Revocation: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5152: Revocation: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5153: Revocation: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20170519194449Z
nextupdate=20180519194449Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Fri May 19 19:44:49 2017
    Next Update: Sat May 19 19:44:49 2018
    CRL Extensions:
chains.sh: #5154: Revocation: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20170519194449Z
nextupdate=20180519194450Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Fri May 19 19:44:49 2017
    Next Update: Sat May 19 19:44:50 2018
    CRL Extensions:
chains.sh: #5155: Revocation: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20170519194450Z
nextupdate=20180519194450Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Fri May 19 19:44:50 2017
    Next Update: Sat May 19 19:44:50 2018
    CRL Extensions:
chains.sh: #5156: Revocation: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20170519194450Z
nextupdate=20180519194450Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Fri May 19 19:44:50 2017
    Next Update: Sat May 19 19:44:50 2018
    CRL Extensions:
chains.sh: #5157: Revocation: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 14 issued by CA1
crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20170519194451Z
addcert 14 20170519194451Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Fri May 19 19:44:51 2017
    Next Update: Sat May 19 19:44:50 2018
    Entry 1 (0x1):
        Serial Number: 14 (0xe)
        Revocation Date: Fri May 19 19:44:51 2017
    CRL Extensions:
chains.sh: #5158: Revocation: Revoking certificate with SN 14 issued by CA1  - PASSED
chains.sh: Revoking certificate with SN 15 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20170519194452Z
addcert 15 20170519194452Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Fri May 19 19:44:52 2017
    Next Update: Sat May 19 19:44:50 2018
    Entry 1 (0x1):
        Serial Number: 15 (0xf)
        Revocation Date: Fri May 19 19:44:52 2017
    CRL Extensions:
chains.sh: #5159: Revocation: Revoking certificate with SN 15 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #5160: Revocation: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5161: Revocation: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #5162: Revocation: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA0Root.der to AllDB database
certutil -A -n CA0  -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der
chains.sh: #5163: Revocation: Importing certificate CA0Root.der to AllDB database  - PASSED
chains.sh: Importing CRL CA0.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl
chains.sh: #5164: Revocation: Importing CRL CA0.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA1CA0.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der
chains.sh: #5165: Revocation: Importing certificate CA1CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA1.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl
chains.sh: #5166: Revocation: Importing CRL CA1.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA0.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der
chains.sh: #5167: Revocation: Importing certificate CA2CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA2.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl
chains.sh: #5168: Revocation: Importing CRL CA2.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags -d AllDB -pp   -g leaf -m crl     -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:43:27 2017
            Not After : Thu May 19 19:43:27 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:7d:3b:46:61:71:13:6f:a8:89:d3:56:ee:a1:e9:bc:
                    6b:ea:75:ec:16:cb:d8:91:98:71:e0:18:59:44:3b:25:
                    c7:ea:5b:4e:49:fa:02:e2:82:95:43:41:24:da:d5:33:
                    27:06:9b:cf:6b:e7:c6:55:5d:15:bd:e9:06:c5:8f:28:
                    b8:91:e1:40:dd:75:32:77:bd:c3:af:25:a3:f1:ec:d4:
                    cc:0a:c4:24:09:2f:da:fd:49:a6:14:9b:5a:99:8f:4e:
                    13:55:03:8c:9a:0a:fe:0d:45:48:11:e1:57:70:27:a7:
                    11:dd:85:61:c9:a9:58:da:2a:60:0b:b5:41:d0:d1:75:
                    9a:98:03:0f:2e:b8:60:34:71:40:16:bf:d5:1d:51:74:
                    8c:f8:f2:e5:e3:47:1f:5f:86:c2:15:59:e5:16:a4:1e:
                    10:ca:2f:b5:ef:f5:5e:f0:97:14:4c:81:d6:ca:80:2a:
                    f1:4f:f7:bc:09:2e:37:2e:4e:91:e1:79:c9:13:30:6d:
                    ca:2b:36:28:e1:d0:0c:b8:67:75:b7:b7:27:97:56:ae:
                    5b:73:2f:f4:eb:a7:8d:c0:0f:47:4e:f0:30:fe:3f:2f:
                    da:7c:38:dc:42:0e:f1:c4:e1:d3:a1:21:92:eb:1a:da:
                    79:95:f9:76:b0:90:d6:10:37:8a:f8:10:35:81:fe:e3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        73:dc:f6:e3:c2:76:f8:7b:7a:16:84:e2:5b:d8:eb:1b:
        a4:1f:49:93:42:db:08:10:86:11:f7:5a:51:81:7c:85:
        16:f6:84:f9:7e:8e:cf:24:ee:e8:b4:8e:66:e1:f2:41:
        c6:35:10:a0:25:d6:ca:6a:50:be:15:64:38:4c:fe:df:
        3d:ea:28:0e:a2:e5:51:c6:b2:23:91:d4:e0:be:76:67:
        0f:8a:52:d4:67:ca:10:76:21:da:1f:85:fc:1d:aa:1e:
        76:3b:9a:ef:62:fa:19:b7:38:dd:9f:0e:bd:32:b6:d6:
        73:4a:f4:fa:7b:75:77:e0:e2:5d:e8:64:15:6d:9c:ec:
        08:a4:2f:53:70:28:be:a3:02:91:43:c2:2e:c3:b2:b8:
        46:8f:3f:ca:2e:79:b6:a7:8d:c2:8d:84:94:33:e8:94:
        56:da:65:2b:06:9f:55:e6:cc:bb:66:7e:7c:26:e3:f7:
        36:39:60:3f:45:0f:08:c4:84:4e:bb:e7:37:9b:cf:32:
        b7:20:fd:12:52:95:6f:6a:97:1b:fa:e2:1e:0f:f7:22:
        c9:14:ae:61:12:8c:d8:0f:b4:e3:48:14:78:c8:20:27:
        c6:61:5f:e0:59:40:9c:f2:42:02:89:d3:e0:09:8c:7f:
        bb:72:62:54:cd:54:ff:de:ea:1b:a6:1a:4c:8d:f6:85
    Fingerprint (SHA-256):
        C9:20:07:4A:A1:D1:09:37:E1:7F:21:4D:E3:6F:82:D1:B6:E5:79:60:16:BC:0A:FE:18:81:28:BC:FC:48:D6:55
    Fingerprint (SHA1):
        9C:EA:9F:55:42:25:96:A4:29:4E:AA:D2:0C:4E:EA:6E:5D:9A:AA:03

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #5169: Revocation: Verifying certificate(s)  EE11CA1.der with flags -d AllDB -pp   -g leaf -m crl     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE12CA1.der with flags -d AllDB -pp   -g leaf -m crl     -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -m crl     EE12CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5170: Revocation: Verifying certificate(s)  EE12CA1.der with flags -d AllDB -pp   -g leaf -m crl     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags -d AllDB -pp   -g chain -m crl     -t Root.der
vfychain -d AllDB -pp -vv   -g chain -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:43:27 2017
            Not After : Thu May 19 19:43:27 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:7d:3b:46:61:71:13:6f:a8:89:d3:56:ee:a1:e9:bc:
                    6b:ea:75:ec:16:cb:d8:91:98:71:e0:18:59:44:3b:25:
                    c7:ea:5b:4e:49:fa:02:e2:82:95:43:41:24:da:d5:33:
                    27:06:9b:cf:6b:e7:c6:55:5d:15:bd:e9:06:c5:8f:28:
                    b8:91:e1:40:dd:75:32:77:bd:c3:af:25:a3:f1:ec:d4:
                    cc:0a:c4:24:09:2f:da:fd:49:a6:14:9b:5a:99:8f:4e:
                    13:55:03:8c:9a:0a:fe:0d:45:48:11:e1:57:70:27:a7:
                    11:dd:85:61:c9:a9:58:da:2a:60:0b:b5:41:d0:d1:75:
                    9a:98:03:0f:2e:b8:60:34:71:40:16:bf:d5:1d:51:74:
                    8c:f8:f2:e5:e3:47:1f:5f:86:c2:15:59:e5:16:a4:1e:
                    10:ca:2f:b5:ef:f5:5e:f0:97:14:4c:81:d6:ca:80:2a:
                    f1:4f:f7:bc:09:2e:37:2e:4e:91:e1:79:c9:13:30:6d:
                    ca:2b:36:28:e1:d0:0c:b8:67:75:b7:b7:27:97:56:ae:
                    5b:73:2f:f4:eb:a7:8d:c0:0f:47:4e:f0:30:fe:3f:2f:
                    da:7c:38:dc:42:0e:f1:c4:e1:d3:a1:21:92:eb:1a:da:
                    79:95:f9:76:b0:90:d6:10:37:8a:f8:10:35:81:fe:e3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        73:dc:f6:e3:c2:76:f8:7b:7a:16:84:e2:5b:d8:eb:1b:
        a4:1f:49:93:42:db:08:10:86:11:f7:5a:51:81:7c:85:
        16:f6:84:f9:7e:8e:cf:24:ee:e8:b4:8e:66:e1:f2:41:
        c6:35:10:a0:25:d6:ca:6a:50:be:15:64:38:4c:fe:df:
        3d:ea:28:0e:a2:e5:51:c6:b2:23:91:d4:e0:be:76:67:
        0f:8a:52:d4:67:ca:10:76:21:da:1f:85:fc:1d:aa:1e:
        76:3b:9a:ef:62:fa:19:b7:38:dd:9f:0e:bd:32:b6:d6:
        73:4a:f4:fa:7b:75:77:e0:e2:5d:e8:64:15:6d:9c:ec:
        08:a4:2f:53:70:28:be:a3:02:91:43:c2:2e:c3:b2:b8:
        46:8f:3f:ca:2e:79:b6:a7:8d:c2:8d:84:94:33:e8:94:
        56:da:65:2b:06:9f:55:e6:cc:bb:66:7e:7c:26:e3:f7:
        36:39:60:3f:45:0f:08:c4:84:4e:bb:e7:37:9b:cf:32:
        b7:20:fd:12:52:95:6f:6a:97:1b:fa:e2:1e:0f:f7:22:
        c9:14:ae:61:12:8c:d8:0f:b4:e3:48:14:78:c8:20:27:
        c6:61:5f:e0:59:40:9c:f2:42:02:89:d3:e0:09:8c:7f:
        bb:72:62:54:cd:54:ff:de:ea:1b:a6:1a:4c:8d:f6:85
    Fingerprint (SHA-256):
        C9:20:07:4A:A1:D1:09:37:E1:7F:21:4D:E3:6F:82:D1:B6:E5:79:60:16:BC:0A:FE:18:81:28:BC:FC:48:D6:55
    Fingerprint (SHA1):
        9C:EA:9F:55:42:25:96:A4:29:4E:AA:D2:0C:4E:EA:6E:5D:9A:AA:03

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #5171: Revocation: Verifying certificate(s)  EE11CA1.der with flags -d AllDB -pp   -g chain -m crl     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der with flags -d AllDB -pp   -g chain -m crl     -t Root.der
vfychain -d AllDB -pp -vv   -g chain -m crl     EE21CA2.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5172: Revocation: Verifying certificate(s)  EE21CA2.der with flags -d AllDB -pp   -g chain -m crl     -t Root.der - PASSED
tstclnt -h 127.0.0.1 -p 8641 -q -t 20
chains.sh: #5173: Test that OCSP server is reachable - PASSED
chains.sh: Creating DB OCSPRootDB
certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd
chains.sh: #5174: OCSP: Creating DB OCSPRootDB  - PASSED
chains.sh: Importing certificate OCSPRoot.der to OCSPRootDB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i ../OCSPD/OCSPRoot.der
chains.sh: #5175: OCSP: Importing certificate OCSPRoot.der to OCSPRootDB database  - PASSED
chains.sh: Creating DB OCSPCA1DB
certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd
chains.sh: #5176: OCSP: Creating DB OCSPCA1DB  - PASSED
chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database
/<<PKGBUILDDIR>>/dist/bin/pk12util -d OCSPCA1DB -i ../OCSPD/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #5177: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database  - PASSED
chains.sh: Create CRL for OCSPCA1DB
crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20170519194456Z
nextupdate=20180519194456Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Fri May 19 19:44:56 2017
    Next Update: Sat May 19 19:44:56 2018
    CRL Extensions:
chains.sh: #5178: OCSP: Create CRL for OCSPCA1DB  - PASSED
chains.sh: Revoking certificate with SN 3 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20170519194457Z
addcert 3 20170519194457Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Fri May 19 19:44:57 2017
    Next Update: Sat May 19 19:44:56 2018
    Entry 1 (0x1):
        Serial Number: 3 (0x3)
        Revocation Date: Fri May 19 19:44:57 2017
    CRL Extensions:
chains.sh: #5179: OCSP: Revoking certificate with SN 3 issued by OCSPCA1  - PASSED
chains.sh: Revoking certificate with SN 4 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20170519194458Z
addcert 4 20170519194458Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Fri May 19 19:44:58 2017
    Next Update: Sat May 19 19:44:56 2018
    Entry 1 (0x1):
        Serial Number: 4 (0x4)
        Revocation Date: Fri May 19 19:44:58 2017
    Entry 2 (0x2):
        Serial Number: 3 (0x3)
        Revocation Date: Fri May 19 19:44:57 2017
    CRL Extensions:
chains.sh: #5180: OCSP: Revoking certificate with SN 4 issued by OCSPCA1  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185130 (0x1ef222ea)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Fri May 19 18:51:39 2017
            Not After : Thu May 19 18:51:39 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:54:eb:22:7b:de:a7:9e:e1:77:34:08:87:b3:00:63:
                    41:3b:c2:97:d0:9e:b2:bc:de:7e:f7:22:ae:b4:a8:fe:
                    db:bb:44:3a:6f:c1:ba:0f:8a:be:42:39:45:77:62:e9:
                    28:ce:1e:3e:0e:c2:e5:d2:bd:c7:7f:71:40:ab:67:36:
                    3c:9c:d4:11:ea:7b:8b:58:5d:2a:2e:81:bd:e4:89:ab:
                    ad:9c:23:3f:f9:ef:e7:bb:7b:89:21:75:fe:74:cc:7c:
                    9a:6a:48:5f:c2:0a:34:e8:86:80:cb:28:8e:24:45:71:
                    34:14:e8:0e:56:25:42:d8:cf:b7:71:df:d0:65:d8:eb:
                    67:89:24:4e:6e:0b:60:5e:9c:01:f0:18:42:e9:06:13:
                    11:41:70:05:6d:85:e9:fe:c1:96:67:f3:44:9d:ea:13:
                    b9:bd:85:ca:54:cb:a4:2a:bf:12:61:48:77:e7:3e:b5:
                    f2:d6:73:bf:22:d3:8c:c6:b5:7f:be:49:fb:55:f1:4d:
                    db:53:15:c7:66:d8:13:c3:01:25:56:11:19:e4:e8:2a:
                    b9:56:4d:11:0c:c0:bd:9e:da:79:b4:ed:57:78:40:57:
                    1c:43:67:00:60:1c:b7:60:4c:58:87:91:74:9a:23:bd:
                    aa:13:ce:ce:49:57:00:c4:55:e5:2e:9a:83:e8:df:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a0:ce:f5:c6:31:24:13:46:6f:1c:22:4f:09:e3:6f:f2:
        75:47:de:9a:6e:fa:d5:dc:22:29:37:7b:0c:91:36:75:
        a3:d8:d5:62:1b:65:5e:de:a7:3e:71:a7:96:61:5e:ef:
        5e:b3:0f:b6:a7:c3:93:c0:26:de:1f:cf:a8:f7:eb:94:
        61:fe:0d:c1:f6:ec:17:a7:30:6f:1a:5f:9e:33:28:a8:
        67:c5:c6:80:d0:41:18:7e:bf:06:4d:2a:9b:d3:a4:c4:
        c2:0a:15:c5:3b:f2:a4:65:9d:7f:53:0f:07:a8:b5:77:
        e0:65:42:5a:db:29:8f:36:c6:e1:54:1e:ca:2c:60:63:
        15:0c:e8:21:9c:fe:03:2d:c3:ce:81:8e:74:bf:00:a1:
        f1:b2:54:69:64:6f:70:32:ba:65:9d:24:ea:1f:38:7f:
        7e:34:11:58:7d:7d:8d:da:98:29:96:37:13:65:11:ea:
        c6:2f:5c:ee:56:40:b7:d6:5a:a9:05:ec:9a:6c:6d:1d:
        ea:c4:34:4c:a9:4a:2c:d0:db:bd:99:91:58:0d:59:da:
        4f:d4:20:31:b6:92:ef:d1:bf:cb:bf:05:88:9c:41:c0:
        94:17:77:8d:08:a1:b2:4c:0d:96:6d:00:94:70:37:d4:
        a3:c6:2a:e3:4c:df:74:07:c8:d8:fa:69:ba:29:cb:25
    Fingerprint (SHA-256):
        3A:15:DF:C9:A5:85:D7:3B:1D:B6:96:32:CB:33:CF:0B:98:41:BA:A0:32:EE:E2:41:1A:E0:EE:04:7B:2B:BB:14
    Fingerprint (SHA1):
        E2:A4:75:51:1F:B0:52:45:48:93:01:88:34:05:D0:A2:92:87:7D:FC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5181: OCSP: Verifying certificate(s)  OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5182: OCSP: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp     ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185130 (0x1ef222ea)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Fri May 19 18:51:39 2017
            Not After : Thu May 19 18:51:39 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:54:eb:22:7b:de:a7:9e:e1:77:34:08:87:b3:00:63:
                    41:3b:c2:97:d0:9e:b2:bc:de:7e:f7:22:ae:b4:a8:fe:
                    db:bb:44:3a:6f:c1:ba:0f:8a:be:42:39:45:77:62:e9:
                    28:ce:1e:3e:0e:c2:e5:d2:bd:c7:7f:71:40:ab:67:36:
                    3c:9c:d4:11:ea:7b:8b:58:5d:2a:2e:81:bd:e4:89:ab:
                    ad:9c:23:3f:f9:ef:e7:bb:7b:89:21:75:fe:74:cc:7c:
                    9a:6a:48:5f:c2:0a:34:e8:86:80:cb:28:8e:24:45:71:
                    34:14:e8:0e:56:25:42:d8:cf:b7:71:df:d0:65:d8:eb:
                    67:89:24:4e:6e:0b:60:5e:9c:01:f0:18:42:e9:06:13:
                    11:41:70:05:6d:85:e9:fe:c1:96:67:f3:44:9d:ea:13:
                    b9:bd:85:ca:54:cb:a4:2a:bf:12:61:48:77:e7:3e:b5:
                    f2:d6:73:bf:22:d3:8c:c6:b5:7f:be:49:fb:55:f1:4d:
                    db:53:15:c7:66:d8:13:c3:01:25:56:11:19:e4:e8:2a:
                    b9:56:4d:11:0c:c0:bd:9e:da:79:b4:ed:57:78:40:57:
                    1c:43:67:00:60:1c:b7:60:4c:58:87:91:74:9a:23:bd:
                    aa:13:ce:ce:49:57:00:c4:55:e5:2e:9a:83:e8:df:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a0:ce:f5:c6:31:24:13:46:6f:1c:22:4f:09:e3:6f:f2:
        75:47:de:9a:6e:fa:d5:dc:22:29:37:7b:0c:91:36:75:
        a3:d8:d5:62:1b:65:5e:de:a7:3e:71:a7:96:61:5e:ef:
        5e:b3:0f:b6:a7:c3:93:c0:26:de:1f:cf:a8:f7:eb:94:
        61:fe:0d:c1:f6:ec:17:a7:30:6f:1a:5f:9e:33:28:a8:
        67:c5:c6:80:d0:41:18:7e:bf:06:4d:2a:9b:d3:a4:c4:
        c2:0a:15:c5:3b:f2:a4:65:9d:7f:53:0f:07:a8:b5:77:
        e0:65:42:5a:db:29:8f:36:c6:e1:54:1e:ca:2c:60:63:
        15:0c:e8:21:9c:fe:03:2d:c3:ce:81:8e:74:bf:00:a1:
        f1:b2:54:69:64:6f:70:32:ba:65:9d:24:ea:1f:38:7f:
        7e:34:11:58:7d:7d:8d:da:98:29:96:37:13:65:11:ea:
        c6:2f:5c:ee:56:40:b7:d6:5a:a9:05:ec:9a:6c:6d:1d:
        ea:c4:34:4c:a9:4a:2c:d0:db:bd:99:91:58:0d:59:da:
        4f:d4:20:31:b6:92:ef:d1:bf:cb:bf:05:88:9c:41:c0:
        94:17:77:8d:08:a1:b2:4c:0d:96:6d:00:94:70:37:d4:
        a3:c6:2a:e3:4c:df:74:07:c8:d8:fa:69:ba:29:cb:25
    Fingerprint (SHA-256):
        3A:15:DF:C9:A5:85:D7:3B:1D:B6:96:32:CB:33:CF:0B:98:41:BA:A0:32:EE:E2:41:1A:E0:EE:04:7B:2B:BB:14
    Fingerprint (SHA1):
        E2:A4:75:51:1F:B0:52:45:48:93:01:88:34:05:D0:A2:92:87:7D:FC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5183: OCSP: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5184: OCSP: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp     ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185130 (0x1ef222ea)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Fri May 19 18:51:39 2017
            Not After : Thu May 19 18:51:39 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:54:eb:22:7b:de:a7:9e:e1:77:34:08:87:b3:00:63:
                    41:3b:c2:97:d0:9e:b2:bc:de:7e:f7:22:ae:b4:a8:fe:
                    db:bb:44:3a:6f:c1:ba:0f:8a:be:42:39:45:77:62:e9:
                    28:ce:1e:3e:0e:c2:e5:d2:bd:c7:7f:71:40:ab:67:36:
                    3c:9c:d4:11:ea:7b:8b:58:5d:2a:2e:81:bd:e4:89:ab:
                    ad:9c:23:3f:f9:ef:e7:bb:7b:89:21:75:fe:74:cc:7c:
                    9a:6a:48:5f:c2:0a:34:e8:86:80:cb:28:8e:24:45:71:
                    34:14:e8:0e:56:25:42:d8:cf:b7:71:df:d0:65:d8:eb:
                    67:89:24:4e:6e:0b:60:5e:9c:01:f0:18:42:e9:06:13:
                    11:41:70:05:6d:85:e9:fe:c1:96:67:f3:44:9d:ea:13:
                    b9:bd:85:ca:54:cb:a4:2a:bf:12:61:48:77:e7:3e:b5:
                    f2:d6:73:bf:22:d3:8c:c6:b5:7f:be:49:fb:55:f1:4d:
                    db:53:15:c7:66:d8:13:c3:01:25:56:11:19:e4:e8:2a:
                    b9:56:4d:11:0c:c0:bd:9e:da:79:b4:ed:57:78:40:57:
                    1c:43:67:00:60:1c:b7:60:4c:58:87:91:74:9a:23:bd:
                    aa:13:ce:ce:49:57:00:c4:55:e5:2e:9a:83:e8:df:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a0:ce:f5:c6:31:24:13:46:6f:1c:22:4f:09:e3:6f:f2:
        75:47:de:9a:6e:fa:d5:dc:22:29:37:7b:0c:91:36:75:
        a3:d8:d5:62:1b:65:5e:de:a7:3e:71:a7:96:61:5e:ef:
        5e:b3:0f:b6:a7:c3:93:c0:26:de:1f:cf:a8:f7:eb:94:
        61:fe:0d:c1:f6:ec:17:a7:30:6f:1a:5f:9e:33:28:a8:
        67:c5:c6:80:d0:41:18:7e:bf:06:4d:2a:9b:d3:a4:c4:
        c2:0a:15:c5:3b:f2:a4:65:9d:7f:53:0f:07:a8:b5:77:
        e0:65:42:5a:db:29:8f:36:c6:e1:54:1e:ca:2c:60:63:
        15:0c:e8:21:9c:fe:03:2d:c3:ce:81:8e:74:bf:00:a1:
        f1:b2:54:69:64:6f:70:32:ba:65:9d:24:ea:1f:38:7f:
        7e:34:11:58:7d:7d:8d:da:98:29:96:37:13:65:11:ea:
        c6:2f:5c:ee:56:40:b7:d6:5a:a9:05:ec:9a:6c:6d:1d:
        ea:c4:34:4c:a9:4a:2c:d0:db:bd:99:91:58:0d:59:da:
        4f:d4:20:31:b6:92:ef:d1:bf:cb:bf:05:88:9c:41:c0:
        94:17:77:8d:08:a1:b2:4c:0d:96:6d:00:94:70:37:d4:
        a3:c6:2a:e3:4c:df:74:07:c8:d8:fa:69:ba:29:cb:25
    Fingerprint (SHA-256):
        3A:15:DF:C9:A5:85:D7:3B:1D:B6:96:32:CB:33:CF:0B:98:41:BA:A0:32:EE:E2:41:1A:E0:EE:04:7B:2B:BB:14
    Fingerprint (SHA1):
        E2:A4:75:51:1F:B0:52:45:48:93:01:88:34:05:D0:A2:92:87:7D:FC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #5185: OCSP: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5186: OCSP: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g chain -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g chain -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5187: OCSP: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g chain -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp     ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185130 (0x1ef222ea)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Fri May 19 18:51:39 2017
            Not After : Thu May 19 18:51:39 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:54:eb:22:7b:de:a7:9e:e1:77:34:08:87:b3:00:63:
                    41:3b:c2:97:d0:9e:b2:bc:de:7e:f7:22:ae:b4:a8:fe:
                    db:bb:44:3a:6f:c1:ba:0f:8a:be:42:39:45:77:62:e9:
                    28:ce:1e:3e:0e:c2:e5:d2:bd:c7:7f:71:40:ab:67:36:
                    3c:9c:d4:11:ea:7b:8b:58:5d:2a:2e:81:bd:e4:89:ab:
                    ad:9c:23:3f:f9:ef:e7:bb:7b:89:21:75:fe:74:cc:7c:
                    9a:6a:48:5f:c2:0a:34:e8:86:80:cb:28:8e:24:45:71:
                    34:14:e8:0e:56:25:42:d8:cf:b7:71:df:d0:65:d8:eb:
                    67:89:24:4e:6e:0b:60:5e:9c:01:f0:18:42:e9:06:13:
                    11:41:70:05:6d:85:e9:fe:c1:96:67:f3:44:9d:ea:13:
                    b9:bd:85:ca:54:cb:a4:2a:bf:12:61:48:77:e7:3e:b5:
                    f2:d6:73:bf:22:d3:8c:c6:b5:7f:be:49:fb:55:f1:4d:
                    db:53:15:c7:66:d8:13:c3:01:25:56:11:19:e4:e8:2a:
                    b9:56:4d:11:0c:c0:bd:9e:da:79:b4:ed:57:78:40:57:
                    1c:43:67:00:60:1c:b7:60:4c:58:87:91:74:9a:23:bd:
                    aa:13:ce:ce:49:57:00:c4:55:e5:2e:9a:83:e8:df:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a0:ce:f5:c6:31:24:13:46:6f:1c:22:4f:09:e3:6f:f2:
        75:47:de:9a:6e:fa:d5:dc:22:29:37:7b:0c:91:36:75:
        a3:d8:d5:62:1b:65:5e:de:a7:3e:71:a7:96:61:5e:ef:
        5e:b3:0f:b6:a7:c3:93:c0:26:de:1f:cf:a8:f7:eb:94:
        61:fe:0d:c1:f6:ec:17:a7:30:6f:1a:5f:9e:33:28:a8:
        67:c5:c6:80:d0:41:18:7e:bf:06:4d:2a:9b:d3:a4:c4:
        c2:0a:15:c5:3b:f2:a4:65:9d:7f:53:0f:07:a8:b5:77:
        e0:65:42:5a:db:29:8f:36:c6:e1:54:1e:ca:2c:60:63:
        15:0c:e8:21:9c:fe:03:2d:c3:ce:81:8e:74:bf:00:a1:
        f1:b2:54:69:64:6f:70:32:ba:65:9d:24:ea:1f:38:7f:
        7e:34:11:58:7d:7d:8d:da:98:29:96:37:13:65:11:ea:
        c6:2f:5c:ee:56:40:b7:d6:5a:a9:05:ec:9a:6c:6d:1d:
        ea:c4:34:4c:a9:4a:2c:d0:db:bd:99:91:58:0d:59:da:
        4f:d4:20:31:b6:92:ef:d1:bf:cb:bf:05:88:9c:41:c0:
        94:17:77:8d:08:a1:b2:4c:0d:96:6d:00:94:70:37:d4:
        a3:c6:2a:e3:4c:df:74:07:c8:d8:fa:69:ba:29:cb:25
    Fingerprint (SHA-256):
        3A:15:DF:C9:A5:85:D7:3B:1D:B6:96:32:CB:33:CF:0B:98:41:BA:A0:32:EE:E2:41:1A:E0:EE:04:7B:2B:BB:14
    Fingerprint (SHA1):
        E2:A4:75:51:1F:B0:52:45:48:93:01:88:34:05:D0:A2:92:87:7D:FC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US"
Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #5188: OCSP: Verifying certificate(s)  OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -h requireFreshInfo -m ocsp     ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5189: OCSP: Verifying certificate(s)  OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -h requireFreshInfo -m ocsp     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s doNotUse     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp -s doNotUse     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185130 (0x1ef222ea)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Fri May 19 18:51:39 2017
            Not After : Thu May 19 18:51:39 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:54:eb:22:7b:de:a7:9e:e1:77:34:08:87:b3:00:63:
                    41:3b:c2:97:d0:9e:b2:bc:de:7e:f7:22:ae:b4:a8:fe:
                    db:bb:44:3a:6f:c1:ba:0f:8a:be:42:39:45:77:62:e9:
                    28:ce:1e:3e:0e:c2:e5:d2:bd:c7:7f:71:40:ab:67:36:
                    3c:9c:d4:11:ea:7b:8b:58:5d:2a:2e:81:bd:e4:89:ab:
                    ad:9c:23:3f:f9:ef:e7:bb:7b:89:21:75:fe:74:cc:7c:
                    9a:6a:48:5f:c2:0a:34:e8:86:80:cb:28:8e:24:45:71:
                    34:14:e8:0e:56:25:42:d8:cf:b7:71:df:d0:65:d8:eb:
                    67:89:24:4e:6e:0b:60:5e:9c:01:f0:18:42:e9:06:13:
                    11:41:70:05:6d:85:e9:fe:c1:96:67:f3:44:9d:ea:13:
                    b9:bd:85:ca:54:cb:a4:2a:bf:12:61:48:77:e7:3e:b5:
                    f2:d6:73:bf:22:d3:8c:c6:b5:7f:be:49:fb:55:f1:4d:
                    db:53:15:c7:66:d8:13:c3:01:25:56:11:19:e4:e8:2a:
                    b9:56:4d:11:0c:c0:bd:9e:da:79:b4:ed:57:78:40:57:
                    1c:43:67:00:60:1c:b7:60:4c:58:87:91:74:9a:23:bd:
                    aa:13:ce:ce:49:57:00:c4:55:e5:2e:9a:83:e8:df:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a0:ce:f5:c6:31:24:13:46:6f:1c:22:4f:09:e3:6f:f2:
        75:47:de:9a:6e:fa:d5:dc:22:29:37:7b:0c:91:36:75:
        a3:d8:d5:62:1b:65:5e:de:a7:3e:71:a7:96:61:5e:ef:
        5e:b3:0f:b6:a7:c3:93:c0:26:de:1f:cf:a8:f7:eb:94:
        61:fe:0d:c1:f6:ec:17:a7:30:6f:1a:5f:9e:33:28:a8:
        67:c5:c6:80:d0:41:18:7e:bf:06:4d:2a:9b:d3:a4:c4:
        c2:0a:15:c5:3b:f2:a4:65:9d:7f:53:0f:07:a8:b5:77:
        e0:65:42:5a:db:29:8f:36:c6:e1:54:1e:ca:2c:60:63:
        15:0c:e8:21:9c:fe:03:2d:c3:ce:81:8e:74:bf:00:a1:
        f1:b2:54:69:64:6f:70:32:ba:65:9d:24:ea:1f:38:7f:
        7e:34:11:58:7d:7d:8d:da:98:29:96:37:13:65:11:ea:
        c6:2f:5c:ee:56:40:b7:d6:5a:a9:05:ec:9a:6c:6d:1d:
        ea:c4:34:4c:a9:4a:2c:d0:db:bd:99:91:58:0d:59:da:
        4f:d4:20:31:b6:92:ef:d1:bf:cb:bf:05:88:9c:41:c0:
        94:17:77:8d:08:a1:b2:4c:0d:96:6d:00:94:70:37:d4:
        a3:c6:2a:e3:4c:df:74:07:c8:d8:fa:69:ba:29:cb:25
    Fingerprint (SHA-256):
        3A:15:DF:C9:A5:85:D7:3B:1D:B6:96:32:CB:33:CF:0B:98:41:BA:A0:32:EE:E2:41:1A:E0:EE:04:7B:2B:BB:14
    Fingerprint (SHA1):
        E2:A4:75:51:1F:B0:52:45:48:93:01:88:34:05:D0:A2:92:87:7D:FC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5190: OCSP: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s doNotUse     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s forbidFetching     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp -s forbidFetching     ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185130 (0x1ef222ea)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Fri May 19 18:51:39 2017
            Not After : Thu May 19 18:51:39 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:54:eb:22:7b:de:a7:9e:e1:77:34:08:87:b3:00:63:
                    41:3b:c2:97:d0:9e:b2:bc:de:7e:f7:22:ae:b4:a8:fe:
                    db:bb:44:3a:6f:c1:ba:0f:8a:be:42:39:45:77:62:e9:
                    28:ce:1e:3e:0e:c2:e5:d2:bd:c7:7f:71:40:ab:67:36:
                    3c:9c:d4:11:ea:7b:8b:58:5d:2a:2e:81:bd:e4:89:ab:
                    ad:9c:23:3f:f9:ef:e7:bb:7b:89:21:75:fe:74:cc:7c:
                    9a:6a:48:5f:c2:0a:34:e8:86:80:cb:28:8e:24:45:71:
                    34:14:e8:0e:56:25:42:d8:cf:b7:71:df:d0:65:d8:eb:
                    67:89:24:4e:6e:0b:60:5e:9c:01:f0:18:42:e9:06:13:
                    11:41:70:05:6d:85:e9:fe:c1:96:67:f3:44:9d:ea:13:
                    b9:bd:85:ca:54:cb:a4:2a:bf:12:61:48:77:e7:3e:b5:
                    f2:d6:73:bf:22:d3:8c:c6:b5:7f:be:49:fb:55:f1:4d:
                    db:53:15:c7:66:d8:13:c3:01:25:56:11:19:e4:e8:2a:
                    b9:56:4d:11:0c:c0:bd:9e:da:79:b4:ed:57:78:40:57:
                    1c:43:67:00:60:1c:b7:60:4c:58:87:91:74:9a:23:bd:
                    aa:13:ce:ce:49:57:00:c4:55:e5:2e:9a:83:e8:df:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a0:ce:f5:c6:31:24:13:46:6f:1c:22:4f:09:e3:6f:f2:
        75:47:de:9a:6e:fa:d5:dc:22:29:37:7b:0c:91:36:75:
        a3:d8:d5:62:1b:65:5e:de:a7:3e:71:a7:96:61:5e:ef:
        5e:b3:0f:b6:a7:c3:93:c0:26:de:1f:cf:a8:f7:eb:94:
        61:fe:0d:c1:f6:ec:17:a7:30:6f:1a:5f:9e:33:28:a8:
        67:c5:c6:80:d0:41:18:7e:bf:06:4d:2a:9b:d3:a4:c4:
        c2:0a:15:c5:3b:f2:a4:65:9d:7f:53:0f:07:a8:b5:77:
        e0:65:42:5a:db:29:8f:36:c6:e1:54:1e:ca:2c:60:63:
        15:0c:e8:21:9c:fe:03:2d:c3:ce:81:8e:74:bf:00:a1:
        f1:b2:54:69:64:6f:70:32:ba:65:9d:24:ea:1f:38:7f:
        7e:34:11:58:7d:7d:8d:da:98:29:96:37:13:65:11:ea:
        c6:2f:5c:ee:56:40:b7:d6:5a:a9:05:ec:9a:6c:6d:1d:
        ea:c4:34:4c:a9:4a:2c:d0:db:bd:99:91:58:0d:59:da:
        4f:d4:20:31:b6:92:ef:d1:bf:cb:bf:05:88:9c:41:c0:
        94:17:77:8d:08:a1:b2:4c:0d:96:6d:00:94:70:37:d4:
        a3:c6:2a:e3:4c:df:74:07:c8:d8:fa:69:ba:29:cb:25
    Fingerprint (SHA-256):
        3A:15:DF:C9:A5:85:D7:3B:1D:B6:96:32:CB:33:CF:0B:98:41:BA:A0:32:EE:E2:41:1A:E0:EE:04:7B:2B:BB:14
    Fingerprint (SHA1):
        E2:A4:75:51:1F:B0:52:45:48:93:01:88:34:05:D0:A2:92:87:7D:FC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5191: OCSP: Verifying certificate(s)  OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s forbidFetching     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s failIfNoInfo     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp -s failIfNoInfo     ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8071: The OCSP server experienced an internal error.
Returned value is 1, expected result is fail
chains.sh: #5192: OCSP: Verifying certificate(s)  OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s failIfNoInfo     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s failIfNoInfo     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv   -g leaf -m ocsp -s failIfNoInfo     ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5193: OCSP: Verifying certificate(s)  OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp   -g leaf -m ocsp -s failIfNoInfo     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp   -g leaf -h testLocalInfoFirst -m ocsp     -t OCSPCA1
vfychain -d OCSPCA1DB -pp -vv   -g leaf -h testLocalInfoFirst -m ocsp     ../OCSPD/OCSPEE13OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der  -t OCSPCA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Fri May 19 18:51:43 2017
            Not After : Thu May 19 18:51:43 2022
        Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:83:e5:69:c7:84:88:84:14:eb:32:02:b6:20:8c:d6:
                    fe:32:a4:70:6f:c2:ff:c0:1e:37:3f:ac:cb:5e:28:23:
                    67:37:91:9a:35:26:98:be:f5:ad:54:c0:4f:60:4c:3a:
                    0e:1f:f0:90:c8:55:b3:f8:fe:09:5f:30:5d:57:2d:34:
                    dc:8b:b7:a5:72:17:e9:98:c4:09:81:5c:64:60:a0:c4:
                    10:b1:91:27:53:78:7f:47:78:5f:22:8f:70:1d:a1:61:
                    93:08:7b:40:18:b6:c4:32:0b:f1:14:6f:a0:9c:b4:9a:
                    df:fa:5f:25:a6:f6:b0:37:de:c6:3f:59:ae:94:4d:21:
                    9f:e9:dd:fe:1c:38:0c:04:ff:73:05:c8:76:2f:fe:56:
                    be:64:5f:6a:63:80:b3:e7:6b:31:9d:e3:18:be:20:b5:
                    11:78:21:0c:83:b0:a7:9f:9e:90:f5:24:95:b4:d6:32:
                    be:54:5f:f7:0f:91:53:36:2a:5f:51:ac:e0:ea:e6:f8:
                    e8:a9:c8:23:e8:f8:b6:72:15:81:be:b1:8f:21:a5:d5:
                    bb:53:30:45:43:db:4b:2c:66:e5:78:d4:48:92:a3:f9:
                    5d:dc:81:04:ef:91:39:8d:94:3b:17:6a:19:a5:ad:d4:
                    ce:c3:b2:4a:8c:f4:29:f9:ed:a2:ac:a0:04:52:10:0d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Authority Information Access
            Method: PKIX Online Certificate Status Protocol
            Location: 
                URI: "http://127.0.0.1:8641/ocsp"

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        57:39:84:0b:44:9c:c2:18:5e:38:0a:de:9f:fb:ad:7a:
        b9:9f:1c:82:0b:07:a6:e5:91:d2:e6:9d:7a:05:85:9c:
        82:41:47:52:f3:67:ba:e2:3c:f1:7e:49:38:6d:c6:07:
        71:8a:20:e6:dd:d4:07:9e:3c:24:53:2d:4b:7b:e2:09:
        81:67:59:53:94:0b:42:7a:2d:da:98:41:2b:3f:d8:15:
        c7:30:e9:df:a6:11:4b:dc:b8:c2:49:bd:21:f1:28:1f:
        09:8c:34:f1:fc:e4:3f:ab:72:0e:96:65:2d:cf:2f:dc:
        41:7d:31:fc:23:cf:7c:b7:9d:b6:6c:df:0e:1c:7f:54:
        f6:b0:05:80:c4:98:62:4f:e3:e3:04:ac:f4:5b:b5:10:
        ed:f5:74:0d:8d:67:cd:72:45:85:a7:7e:a7:83:e1:34:
        ce:41:bc:a3:95:c7:e5:c4:6d:41:4c:fa:0a:ae:da:a7:
        67:37:73:2e:33:46:82:64:64:d5:9d:03:6f:e3:17:29:
        cb:26:e5:b3:d5:ee:d2:7f:f0:75:90:69:3e:8c:41:21:
        4f:b1:e9:2e:29:a7:04:4e:67:6e:00:71:9c:eb:28:aa:
        a8:0b:f1:03:23:11:80:9c:8d:95:fe:94:b2:6c:00:40:
        2d:0a:7e:df:9d:e0:00:22:5c:27:9e:5b:83:1a:96:01
    Fingerprint (SHA-256):
        9B:4D:18:77:89:00:A7:6E:56:CA:89:C2:E2:72:3F:81:9D:6F:DA:CF:72:BA:5D:6C:95:97:D7:53:DE:50:94:52
    Fingerprint (SHA1):
        25:D0:21:D2:C4:75:FA:58:35:81:54:82:28:51:E7:A9:FA:77:1C:43

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User

Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US"
Returned value is 0, expected result is pass
chains.sh: #5194: OCSP: Verifying certificate(s)  OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp   -g leaf -h testLocalInfoFirst -m ocsp     -t OCSPCA1 - PASSED
chains.sh: Creating DB OCSPRoot1DB
certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd
chains.sh: #5195: OCSP: Creating DB OCSPRoot1DB  - PASSED
chains.sh: Importing certificate OCSPRoot.der to OCSPRoot1DB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i ../OCSPD/OCSPRoot.der
chains.sh: #5196: OCSP: Importing certificate OCSPRoot.der to OCSPRoot1DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp   -g chain -m ocsp -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRoot1DB -pp -vv   -g chain -m ocsp -g leaf -m ocsp     ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5197: OCSP: Verifying certificate(s)  OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp   -g chain -m ocsp -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Creating DB OCSPRoot2DB
certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd
chains.sh: #5198: OCSP: Creating DB OCSPRoot2DB  - PASSED
chains.sh: Importing certificate OCSPRoot.der to OCSPRoot2DB database
certutil -A -n OCSPRoot  -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i ../OCSPD/OCSPRoot.der
chains.sh: #5199: OCSP: Importing certificate OCSPRoot.der to OCSPRoot2DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp   -g chain -m ocsp -g leaf -m ocsp     -t OCSPRoot
vfychain -d OCSPRoot2DB -pp -vv   -g chain -m ocsp -g leaf -m ocsp     ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185130 (0x1ef222ea)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Fri May 19 18:51:39 2017
            Not After : Thu May 19 18:51:39 2067
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a4:54:eb:22:7b:de:a7:9e:e1:77:34:08:87:b3:00:63:
                    41:3b:c2:97:d0:9e:b2:bc:de:7e:f7:22:ae:b4:a8:fe:
                    db:bb:44:3a:6f:c1:ba:0f:8a:be:42:39:45:77:62:e9:
                    28:ce:1e:3e:0e:c2:e5:d2:bd:c7:7f:71:40:ab:67:36:
                    3c:9c:d4:11:ea:7b:8b:58:5d:2a:2e:81:bd:e4:89:ab:
                    ad:9c:23:3f:f9:ef:e7:bb:7b:89:21:75:fe:74:cc:7c:
                    9a:6a:48:5f:c2:0a:34:e8:86:80:cb:28:8e:24:45:71:
                    34:14:e8:0e:56:25:42:d8:cf:b7:71:df:d0:65:d8:eb:
                    67:89:24:4e:6e:0b:60:5e:9c:01:f0:18:42:e9:06:13:
                    11:41:70:05:6d:85:e9:fe:c1:96:67:f3:44:9d:ea:13:
                    b9:bd:85:ca:54:cb:a4:2a:bf:12:61:48:77:e7:3e:b5:
                    f2:d6:73:bf:22:d3:8c:c6:b5:7f:be:49:fb:55:f1:4d:
                    db:53:15:c7:66:d8:13:c3:01:25:56:11:19:e4:e8:2a:
                    b9:56:4d:11:0c:c0:bd:9e:da:79:b4:ed:57:78:40:57:
                    1c:43:67:00:60:1c:b7:60:4c:58:87:91:74:9a:23:bd:
                    aa:13:ce:ce:49:57:00:c4:55:e5:2e:9a:83:e8:df:9d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        a0:ce:f5:c6:31:24:13:46:6f:1c:22:4f:09:e3:6f:f2:
        75:47:de:9a:6e:fa:d5:dc:22:29:37:7b:0c:91:36:75:
        a3:d8:d5:62:1b:65:5e:de:a7:3e:71:a7:96:61:5e:ef:
        5e:b3:0f:b6:a7:c3:93:c0:26:de:1f:cf:a8:f7:eb:94:
        61:fe:0d:c1:f6:ec:17:a7:30:6f:1a:5f:9e:33:28:a8:
        67:c5:c6:80:d0:41:18:7e:bf:06:4d:2a:9b:d3:a4:c4:
        c2:0a:15:c5:3b:f2:a4:65:9d:7f:53:0f:07:a8:b5:77:
        e0:65:42:5a:db:29:8f:36:c6:e1:54:1e:ca:2c:60:63:
        15:0c:e8:21:9c:fe:03:2d:c3:ce:81:8e:74:bf:00:a1:
        f1:b2:54:69:64:6f:70:32:ba:65:9d:24:ea:1f:38:7f:
        7e:34:11:58:7d:7d:8d:da:98:29:96:37:13:65:11:ea:
        c6:2f:5c:ee:56:40:b7:d6:5a:a9:05:ec:9a:6c:6d:1d:
        ea:c4:34:4c:a9:4a:2c:d0:db:bd:99:91:58:0d:59:da:
        4f:d4:20:31:b6:92:ef:d1:bf:cb:bf:05:88:9c:41:c0:
        94:17:77:8d:08:a1:b2:4c:0d:96:6d:00:94:70:37:d4:
        a3:c6:2a:e3:4c:df:74:07:c8:d8:fa:69:ba:29:cb:25
    Fingerprint (SHA-256):
        3A:15:DF:C9:A5:85:D7:3B:1D:B6:96:32:CB:33:CF:0B:98:41:BA:A0:32:EE:E2:41:1A:E0:EE:04:7B:2B:BB:14
    Fingerprint (SHA1):
        E2:A4:75:51:1F:B0:52:45:48:93:01:88:34:05:D0:A2:92:87:7D:FC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted Client CA
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #5200: OCSP: Verifying certificate(s)  OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp   -g chain -m ocsp -g leaf -m ocsp     -t OCSPRoot - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #5201: CRLDP: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185396 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #5202: CRLDP: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #5203: CRLDP: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #5204: CRLDP: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA0Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5205: CRLDP: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 519185397   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5206: CRLDP: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5207: CRLDP: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #5208: CRLDP: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://127.0.0.1:8641/testbuildd-8458-CA0-519185170.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5209: CRLDP: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-CA0Root-519185142.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #5210: CRLDP: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5211: CRLDP: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #5212: CRLDP: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE11Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-CA0-519185170.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5213: CRLDP: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 519185398   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5214: CRLDP: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5215: CRLDP: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #5216: CRLDP: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://127.0.0.1:8641/testbuildd-8458-CA0-519185170.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5217: CRLDP: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-CA0Root-519185143.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #5218: CRLDP: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5219: CRLDP: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #5220: CRLDP: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE21Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5221: CRLDP: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 519185399   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5222: CRLDP: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5223: CRLDP: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #5224: CRLDP: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-CA0-519185170.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5225: CRLDP: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-CA0Root-519185144.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #5226: CRLDP: Creating certficate EE1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE1CA0.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5227: CRLDP: Importing certificate EE1CA0.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #5228: CRLDP: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE2Req.der  -4 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-CA0-519185170.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
	1 - Full Name
	2 - Relative Name
	Any other number to finish
		Choice:  > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Select one of the following for the reason flags
	0 - unused
	1 - keyCompromise
	2 - caCompromise
	3 - affiliationChanged
	4 - superseded
	5 - cessationOfOperation
	6 - certificateHold
	Any other number to finish		Choice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #5229: CRLDP: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40   --extAIA < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
1
7
http://127.0.0.1:8641/testbuildd-8458-CA0Root-519185145.der
0
n
n
===
Enter access method type for Authority Information Access extension:
	1 - CA Issuers
	2 - OCSP
	Anyother number to finish
	Choice > 
Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > 
Enter data:

Select one of the following general name type: 
	2 - rfc822Name
	3 - dnsName
	5 - directoryName
	7 - uniformResourceidentifier
	8 - ipAddress
	9 - registerID
	Any other number to finish
		Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #5230: CRLDP: Creating certficate EE2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE2CA0.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5231: CRLDP: Importing certificate EE2CA0.der to EE2DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20170519194648Z
nextupdate=20180519194648Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Fri May 19 19:46:48 2017
    Next Update: Sat May 19 19:46:48 2018
    CRL Extensions:
chains.sh: #5232: CRLDP: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20170519194648Z
nextupdate=20180519194648Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Fri May 19 19:46:48 2017
    Next Update: Sat May 19 19:46:48 2018
    CRL Extensions:
chains.sh: #5233: CRLDP: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20170519194648Z
nextupdate=20180519194648Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Fri May 19 19:46:48 2017
    Next Update: Sat May 19 19:46:48 2018
    CRL Extensions:
chains.sh: #5234: CRLDP: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20170519194649Z
nextupdate=20180519194649Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Fri May 19 19:46:49 2017
    Next Update: Sat May 19 19:46:49 2018
    CRL Extensions:
chains.sh: #5235: CRLDP: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 20 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20170519194650Z
addcert 20 20170519194650Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Fri May 19 19:46:50 2017
    Next Update: Sat May 19 19:46:48 2018
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Fri May 19 19:46:50 2017
    CRL Extensions:
chains.sh: #5236: CRLDP: Revoking certificate with SN 20 issued by CA0  - PASSED
chains.sh: Revoking certificate with SN 40 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20170519194651Z
addcert 40 20170519194651Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Fri May 19 19:46:51 2017
    Next Update: Sat May 19 19:46:48 2018
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Fri May 19 19:46:50 2017
    Entry 2 (0x2):
        Serial Number: 40 (0x28)
        Revocation Date: Fri May 19 19:46:51 2017
    CRL Extensions:
chains.sh: #5237: CRLDP: Revoking certificate with SN 40 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #5238: CRLDP: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5239: CRLDP: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #5240: CRLDP: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags -d AllDB -pp   -g chain -h requireFreshInfo -m crl -f    -t Root.der
vfychain -d AllDB -pp -vv   -g chain -h requireFreshInfo -m crl -f    EE11CA1.der CA1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185396 (0x1ef223f4)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:45:23 2017
            Not After : Thu May 19 19:45:23 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d9:f1:a9:1a:38:a6:a1:5a:a7:69:b1:14:f1:af:af:fd:
                    fb:59:e0:f9:55:a8:24:34:85:39:cd:ba:89:11:ca:49:
                    18:4e:cf:5a:18:27:b7:19:53:2f:47:d6:60:b3:99:af:
                    1b:a2:72:13:a9:bf:23:09:b9:b3:5a:f5:4f:9d:bd:21:
                    9c:df:d2:b7:38:fb:80:f3:bf:33:ec:0e:19:c5:5b:0d:
                    5e:c8:6f:66:79:06:71:a5:76:fc:dc:d3:99:85:82:00:
                    f1:05:27:ee:3b:4b:d6:ba:46:6b:ce:92:40:a3:64:6f:
                    da:60:92:7a:de:9c:7b:8b:eb:8f:1b:74:33:2e:7b:18:
                    19:f4:27:df:d9:d2:07:43:d6:9c:23:0f:f2:60:fb:fa:
                    f8:45:bf:5d:5b:03:24:f1:63:66:78:0c:4c:d0:be:0b:
                    a4:63:3a:78:b7:fa:a0:3f:36:75:74:e0:15:24:39:49:
                    7f:a9:cf:0c:12:64:f2:a9:50:d5:ec:c5:f0:3a:49:66:
                    ed:b6:7c:ef:76:0f:fd:bd:8e:26:1b:93:ae:54:71:11:
                    37:f2:4f:b9:8c:ec:20:9d:48:9b:eb:5b:80:46:c3:d2:
                    f2:5f:31:cf:a2:e5:c9:28:67:f8:d2:a1:3e:b5:b1:6e:
                    88:5d:a0:1d:df:78:91:c2:23:20:62:98:39:72:c7:0f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        c0:0d:8a:af:48:d6:1c:d8:55:8a:c8:35:ea:01:ad:4c:
        98:ff:e2:4c:87:7d:17:3e:b5:d7:20:7a:a4:b9:9b:b2:
        fe:ee:cd:1f:8d:f8:a2:11:02:6d:83:71:18:ba:e8:bc:
        0c:b3:f9:27:48:07:b7:19:d6:06:64:53:f3:73:31:65:
        52:eb:fb:9f:9d:61:fb:e9:2d:bb:ec:48:43:49:d8:83:
        ad:2e:17:a7:2d:9f:75:d1:a4:fd:0a:c0:71:f3:d0:e8:
        ca:2d:1e:2b:d2:e1:30:01:11:6a:23:cf:45:39:bf:69:
        f9:a1:0f:dd:85:59:a7:bb:ac:c6:c4:fe:79:07:93:c7:
        07:13:d5:e5:ad:fa:d9:45:df:84:9e:3e:ba:38:44:86:
        46:ad:3f:55:ee:99:c6:d2:14:2a:1d:71:d0:52:e9:83:
        c3:1f:60:73:d2:74:b6:97:a5:a1:95:c2:1e:26:3c:90:
        64:b3:dd:cb:36:fd:c4:33:c1:58:35:db:c1:29:3c:97:
        30:ca:7f:85:97:c0:9e:0a:00:67:b3:d6:fc:00:ac:fc:
        20:73:c2:34:86:cf:79:09:e2:1a:8e:c7:83:2d:32:ed:
        14:67:0e:ed:b8:14:a7:e6:59:1e:f7:4a:12:ab:76:e6:
        a0:5a:31:65:b3:27:0c:d8:a2:19:18:f1:d6:89:9e:ce
    Fingerprint (SHA-256):
        95:B6:95:57:6E:84:48:19:9B:14:65:92:F5:7D:D4:AD:75:67:A6:3D:06:92:09:14:C7:5C:70:5D:E5:10:57:48
    Fingerprint (SHA1):
        64:F3:33:25:D1:E5:B5:72:3D:B0:6D:26:D1:81:2A:9F:D8:82:30:AD

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #5241: CRLDP: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags -d AllDB -pp   -g chain -h requireFreshInfo -m crl -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags -d AllDB -pp   -g chain -h requireFreshInfo -m crl -f    -t Root.der
vfychain -d AllDB -pp -vv   -g chain -h requireFreshInfo -m crl -f    EE21CA2.der CA2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5242: CRLDP: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags -d AllDB -pp   -g chain -h requireFreshInfo -m crl -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA0.der with flags -d AllDB -pp   -g leaf -h requireFreshInfo -m crl -f    -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -h requireFreshInfo -m crl -f    EE1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185396 (0x1ef223f4)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Fri May 19 19:45:23 2017
            Not After : Thu May 19 19:45:23 2067
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d9:f1:a9:1a:38:a6:a1:5a:a7:69:b1:14:f1:af:af:fd:
                    fb:59:e0:f9:55:a8:24:34:85:39:cd:ba:89:11:ca:49:
                    18:4e:cf:5a:18:27:b7:19:53:2f:47:d6:60:b3:99:af:
                    1b:a2:72:13:a9:bf:23:09:b9:b3:5a:f5:4f:9d:bd:21:
                    9c:df:d2:b7:38:fb:80:f3:bf:33:ec:0e:19:c5:5b:0d:
                    5e:c8:6f:66:79:06:71:a5:76:fc:dc:d3:99:85:82:00:
                    f1:05:27:ee:3b:4b:d6:ba:46:6b:ce:92:40:a3:64:6f:
                    da:60:92:7a:de:9c:7b:8b:eb:8f:1b:74:33:2e:7b:18:
                    19:f4:27:df:d9:d2:07:43:d6:9c:23:0f:f2:60:fb:fa:
                    f8:45:bf:5d:5b:03:24:f1:63:66:78:0c:4c:d0:be:0b:
                    a4:63:3a:78:b7:fa:a0:3f:36:75:74:e0:15:24:39:49:
                    7f:a9:cf:0c:12:64:f2:a9:50:d5:ec:c5:f0:3a:49:66:
                    ed:b6:7c:ef:76:0f:fd:bd:8e:26:1b:93:ae:54:71:11:
                    37:f2:4f:b9:8c:ec:20:9d:48:9b:eb:5b:80:46:c3:d2:
                    f2:5f:31:cf:a2:e5:c9:28:67:f8:d2:a1:3e:b5:b1:6e:
                    88:5d:a0:1d:df:78:91:c2:23:20:62:98:39:72:c7:0f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        c0:0d:8a:af:48:d6:1c:d8:55:8a:c8:35:ea:01:ad:4c:
        98:ff:e2:4c:87:7d:17:3e:b5:d7:20:7a:a4:b9:9b:b2:
        fe:ee:cd:1f:8d:f8:a2:11:02:6d:83:71:18:ba:e8:bc:
        0c:b3:f9:27:48:07:b7:19:d6:06:64:53:f3:73:31:65:
        52:eb:fb:9f:9d:61:fb:e9:2d:bb:ec:48:43:49:d8:83:
        ad:2e:17:a7:2d:9f:75:d1:a4:fd:0a:c0:71:f3:d0:e8:
        ca:2d:1e:2b:d2:e1:30:01:11:6a:23:cf:45:39:bf:69:
        f9:a1:0f:dd:85:59:a7:bb:ac:c6:c4:fe:79:07:93:c7:
        07:13:d5:e5:ad:fa:d9:45:df:84:9e:3e:ba:38:44:86:
        46:ad:3f:55:ee:99:c6:d2:14:2a:1d:71:d0:52:e9:83:
        c3:1f:60:73:d2:74:b6:97:a5:a1:95:c2:1e:26:3c:90:
        64:b3:dd:cb:36:fd:c4:33:c1:58:35:db:c1:29:3c:97:
        30:ca:7f:85:97:c0:9e:0a:00:67:b3:d6:fc:00:ac:fc:
        20:73:c2:34:86:cf:79:09:e2:1a:8e:c7:83:2d:32:ed:
        14:67:0e:ed:b8:14:a7:e6:59:1e:f7:4a:12:ab:76:e6:
        a0:5a:31:65:b3:27:0c:d8:a2:19:18:f1:d6:89:9e:ce
    Fingerprint (SHA-256):
        95:B6:95:57:6E:84:48:19:9B:14:65:92:F5:7D:D4:AD:75:67:A6:3D:06:92:09:14:C7:5C:70:5D:E5:10:57:48
    Fingerprint (SHA1):
        64:F3:33:25:D1:E5:B5:72:3D:B0:6D:26:D1:81:2A:9F:D8:82:30:AD

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #5243: CRLDP: Verifying certificate(s)  EE1CA0.der with flags -d AllDB -pp   -g leaf -h requireFreshInfo -m crl -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA0.der with flags -d AllDB -pp   -g leaf -h requireFreshInfo -m crl -f    -t Root.der
vfychain -d AllDB -pp -vv   -g leaf -h requireFreshInfo -m crl -f    EE2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #5244: CRLDP: Verifying certificate(s)  EE2CA0.der with flags -d AllDB -pp   -g leaf -h requireFreshInfo -m crl -f    -t Root.der - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #5245: TrustAnchors: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185400 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #5246: TrustAnchors: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #5247: TrustAnchors: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #5248: TrustAnchors: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5249: TrustAnchors: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 519185401   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5250: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5251: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #5252: TrustAnchors: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o CA2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5253: TrustAnchors: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 519185402   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5254: TrustAnchors: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5255: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #5256: TrustAnchors: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE1Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5257: TrustAnchors: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 519185403   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5258: TrustAnchors: Creating certficate EE1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE1CA2.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5259: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database  - PASSED
chains.sh: Creating DB OtherRootDB
certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd
chains.sh: #5260: TrustAnchors: Creating DB OtherRootDB  - PASSED
chains.sh: Creating Root CA OtherRoot
certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot  -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -m 519185404 < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > 		0 - SSL Client
		1 - SSL Server
		2 - S/MIME
		3 - Object Signing
		4 - Reserved for future use
		5 - SSL CA
		6 - S/MIME CA
		7 - Object Signing CA
		Other to finish
 > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
chains.sh: #5261: TrustAnchors: Creating Root CA OtherRoot  - PASSED
chains.sh: Exporting Root CA OtherRoot.der
certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der
chains.sh: #5262: TrustAnchors: Exporting Root CA OtherRoot.der  - PASSED
chains.sh: Creating DB OtherIntermediateDB
certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd
chains.sh: #5263: TrustAnchors: Creating DB OtherIntermediateDB  - PASSED
chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der
certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US"  -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o OtherIntermediateReq.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #5264: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der  - PASSED
chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot
certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 519185405   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5265: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot  - PASSED
chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database
certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5266: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #5267: TrustAnchors: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/tests_noise -o EE2Req.der  < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #5268: TrustAnchors: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate
certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 519185406   < /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/cu_data
=== Certutil input data ===

===
chains.sh: #5269: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate  - PASSED
chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der
Notice: Trust flag u is set automatically if the private key is present.
chains.sh: #5270: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database  - PASSED
chains.sh: Creating DB DBOnlyDB
certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd
chains.sh: #5271: TrustAnchors: Creating DB DBOnlyDB  - PASSED
chains.sh: Importing certificate RootCA.der to DBOnlyDB database
certutil -A -n RootCA  -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der
chains.sh: #5272: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database
certutil -A -n CA1  -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der
chains.sh: #5273: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp      
vfychain -d DBOnlyDB -pp -vv       EE1CA2.der CA2CA1.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185400 (0x1ef223f8)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:46:57 2017
            Not After : Thu May 19 19:46:57 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e8:5f:9f:95:b8:e5:9f:6f:96:bc:42:88:3f:f9:5f:e0:
                    53:f2:b6:0b:a4:56:1a:be:c1:55:ea:6e:b0:2f:de:b7:
                    07:69:d3:ea:a9:df:81:d9:61:bd:c9:b6:f9:b8:20:d5:
                    da:b0:8e:f6:0b:5f:36:97:87:db:f1:61:c1:06:46:f0:
                    80:3b:3e:fc:b7:64:93:8b:d0:cd:c5:4b:eb:97:9c:da:
                    af:b1:90:70:7a:5a:80:af:5d:34:be:2e:f9:29:b0:20:
                    09:43:4c:38:a9:87:86:b4:5f:e9:83:76:81:df:7d:a4:
                    65:c3:e5:9d:04:ba:c1:3a:49:bf:7b:67:81:3f:ae:5f:
                    61:d0:83:b3:65:f3:22:cc:35:5f:36:22:01:8a:47:bf:
                    30:0b:96:68:39:12:b0:e6:88:7f:23:e6:69:de:e4:b6:
                    5d:ef:5e:5d:d4:ad:58:9b:1d:78:de:a2:f2:23:23:fc:
                    2b:0b:c8:27:0e:ae:2d:bc:19:5c:3c:21:26:d9:f8:92:
                    78:69:21:fd:25:90:30:68:9d:94:3b:40:7b:54:2b:7e:
                    be:ca:b7:40:f4:aa:22:80:e7:51:d4:ec:5d:11:1a:ea:
                    a7:ba:85:75:c9:68:6b:f4:6b:61:d8:be:f2:11:5a:7b:
                    fc:8d:49:e4:ea:56:0e:97:78:e0:c2:7d:bc:53:0a:bf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        d1:f8:ac:09:b7:b3:d4:bb:c2:47:55:26:fc:cb:53:26:
        b7:7c:ef:13:07:75:06:f4:82:4e:28:38:3a:c7:52:be:
        68:7a:a0:0d:07:de:95:36:8f:69:67:0d:79:4d:86:8a:
        44:73:5c:65:d4:1b:be:7d:c5:13:6e:a5:61:e9:89:27:
        d7:01:93:f9:ca:9c:dc:19:62:db:c9:f1:5d:c7:b8:1d:
        ce:ed:a3:6d:a0:c0:b6:eb:4e:a2:57:86:7c:bb:f1:6a:
        cd:37:f9:76:74:19:7d:d3:a9:df:25:d2:f2:ca:5e:c4:
        de:5f:cc:78:77:a9:21:94:6c:c3:b1:e3:b6:c4:a1:f1:
        1f:be:30:22:ab:6c:94:5d:0a:48:b1:f6:b9:40:f7:6c:
        c7:ce:02:fe:c9:57:62:e0:87:45:25:59:42:d6:18:95:
        3f:a6:1f:10:64:6f:97:2f:e8:83:d1:05:e8:67:fa:5a:
        2a:03:e3:d2:16:ea:d9:2d:10:e2:48:b9:f7:38:64:b2:
        a9:8c:ef:3f:13:bb:0f:1c:cd:2e:8e:74:65:c3:da:b8:
        a5:71:80:02:79:93:d5:52:24:c3:11:44:2b:d7:7a:fe:
        8e:47:39:ff:68:4c:8e:a0:64:0e:a5:aa:94:83:5a:ec:
        71:92:dd:3b:93:d8:c3:33:d5:3b:30:78:58:cb:53:61
    Fingerprint (SHA-256):
        08:EA:DA:E1:AD:11:8C:B2:9F:A9:90:9B:AA:39:40:B8:C1:48:F1:09:9E:3D:C3:5A:5E:5E:C2:8C:18:57:67:5F
    Fingerprint (SHA1):
        6B:F5:BB:93:BC:77:2B:B4:C0:F0:6D:CF:09:AC:90:B0:DF:1C:F9:5B

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5274: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp       - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der with flags -d DBOnlyDB -pp       -t CA2CA1.der
vfychain -d DBOnlyDB -pp -vv       EE1CA2.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185402 (0x1ef223fa)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 19:47:27 2017
            Not After : Thu May 19 19:47:27 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d3:53:42:d4:8b:f6:cc:59:b4:f7:1d:3f:5c:65:8f:d8:
                    15:c1:ee:06:5b:6e:01:a8:a6:23:4a:46:2b:18:72:e0:
                    f1:e6:23:f5:08:66:d7:fd:ed:53:b6:71:b4:1d:92:4d:
                    ae:b4:2e:61:e6:34:1f:28:eb:da:8c:20:bf:ae:93:a2:
                    6e:5d:5f:51:2f:15:a0:e3:3e:65:bf:ca:97:9d:55:0c:
                    a2:74:12:f8:e3:04:4c:ee:d8:c0:02:07:7d:e4:64:ac:
                    47:29:34:27:9d:25:43:e0:ad:55:f8:88:a2:04:dd:88:
                    14:88:36:c0:28:7a:24:17:6c:4b:a8:96:25:e0:76:72:
                    86:1d:07:f0:fb:03:71:c7:6e:bb:48:8b:17:a1:04:e0:
                    7a:5f:92:97:23:23:f1:52:03:f1:c2:66:0c:ad:ca:3f:
                    91:23:16:23:6b:2c:f2:6d:ad:42:21:db:4d:0a:6c:95:
                    66:42:b9:17:42:46:2f:e9:de:98:d9:6c:42:55:b5:98:
                    08:32:30:88:a3:82:eb:f6:37:2f:c2:02:91:e5:d2:69:
                    fb:d8:e7:b1:9d:e4:c9:4b:bc:c2:1f:19:7d:0e:cd:45:
                    15:ec:f0:94:20:d5:f5:ac:a9:70:eb:80:2c:72:d4:1d:
                    19:8d:c8:c2:a0:68:b4:95:e8:75:c9:e9:2d:08:71:43
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9e:65:d8:a7:37:21:62:89:b9:30:38:81:5f:df:22:86:
        96:c5:81:2f:65:a5:eb:6f:7f:96:3e:77:be:57:47:3e:
        78:e9:09:69:92:03:15:ec:7f:39:2b:aa:6a:4e:8e:bf:
        23:d0:bd:3f:f9:93:e6:bf:f6:0d:c1:27:3e:95:83:0f:
        62:69:89:c5:26:23:2f:9c:55:7e:db:56:47:de:b8:ba:
        a5:44:36:d7:84:14:ad:ac:b6:3b:22:3a:ed:08:85:55:
        e4:e5:7a:da:d4:36:02:c8:df:a3:8b:cc:fb:80:4e:2b:
        80:69:6d:92:cb:e1:5b:20:cb:a5:57:4a:80:04:2a:1e:
        2f:ee:f6:73:f5:db:73:0d:9f:c0:43:f2:9b:b2:8e:fd:
        f5:7c:bb:10:cf:db:a8:b3:f7:2d:05:4e:63:05:7f:a7:
        b3:6e:b9:39:5e:db:86:cf:51:e2:e4:6e:6b:bc:62:42:
        dd:f8:b3:03:3c:1a:bc:d8:32:17:ad:45:f6:fc:f9:9e:
        40:b9:dd:9e:06:4f:60:b3:55:e5:d8:66:f6:95:09:16:
        82:a5:28:17:3d:c7:b2:01:5a:15:b9:47:68:ee:7b:84:
        a2:79:07:9e:45:45:1d:b7:3c:8c:ee:f1:e4:0c:fc:fb:
        b5:87:cd:50:a4:12:a5:4c:83:4f:dd:2f:20:ae:63:27
    Fingerprint (SHA-256):
        C9:DC:A2:BF:56:C7:94:80:29:F6:82:41:E3:F2:D9:AC:30:5E:98:B7:27:87:70:06:9C:2F:AA:D3:6D:EA:83:F9
    Fingerprint (SHA1):
        66:9D:E9:F9:92:8E:62:FA:C3:17:24:23:9A:5B:0A:6F:7B:CA:C2:95


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5275: TrustAnchors: Verifying certificate(s)  EE1CA2.der with flags -d DBOnlyDB -pp       -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp       -t RootCA
vfychain -d DBOnlyDB -pp -vv       EE1CA2.der CA2CA1.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185400 (0x1ef223f8)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:46:57 2017
            Not After : Thu May 19 19:46:57 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e8:5f:9f:95:b8:e5:9f:6f:96:bc:42:88:3f:f9:5f:e0:
                    53:f2:b6:0b:a4:56:1a:be:c1:55:ea:6e:b0:2f:de:b7:
                    07:69:d3:ea:a9:df:81:d9:61:bd:c9:b6:f9:b8:20:d5:
                    da:b0:8e:f6:0b:5f:36:97:87:db:f1:61:c1:06:46:f0:
                    80:3b:3e:fc:b7:64:93:8b:d0:cd:c5:4b:eb:97:9c:da:
                    af:b1:90:70:7a:5a:80:af:5d:34:be:2e:f9:29:b0:20:
                    09:43:4c:38:a9:87:86:b4:5f:e9:83:76:81:df:7d:a4:
                    65:c3:e5:9d:04:ba:c1:3a:49:bf:7b:67:81:3f:ae:5f:
                    61:d0:83:b3:65:f3:22:cc:35:5f:36:22:01:8a:47:bf:
                    30:0b:96:68:39:12:b0:e6:88:7f:23:e6:69:de:e4:b6:
                    5d:ef:5e:5d:d4:ad:58:9b:1d:78:de:a2:f2:23:23:fc:
                    2b:0b:c8:27:0e:ae:2d:bc:19:5c:3c:21:26:d9:f8:92:
                    78:69:21:fd:25:90:30:68:9d:94:3b:40:7b:54:2b:7e:
                    be:ca:b7:40:f4:aa:22:80:e7:51:d4:ec:5d:11:1a:ea:
                    a7:ba:85:75:c9:68:6b:f4:6b:61:d8:be:f2:11:5a:7b:
                    fc:8d:49:e4:ea:56:0e:97:78:e0:c2:7d:bc:53:0a:bf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        d1:f8:ac:09:b7:b3:d4:bb:c2:47:55:26:fc:cb:53:26:
        b7:7c:ef:13:07:75:06:f4:82:4e:28:38:3a:c7:52:be:
        68:7a:a0:0d:07:de:95:36:8f:69:67:0d:79:4d:86:8a:
        44:73:5c:65:d4:1b:be:7d:c5:13:6e:a5:61:e9:89:27:
        d7:01:93:f9:ca:9c:dc:19:62:db:c9:f1:5d:c7:b8:1d:
        ce:ed:a3:6d:a0:c0:b6:eb:4e:a2:57:86:7c:bb:f1:6a:
        cd:37:f9:76:74:19:7d:d3:a9:df:25:d2:f2:ca:5e:c4:
        de:5f:cc:78:77:a9:21:94:6c:c3:b1:e3:b6:c4:a1:f1:
        1f:be:30:22:ab:6c:94:5d:0a:48:b1:f6:b9:40:f7:6c:
        c7:ce:02:fe:c9:57:62:e0:87:45:25:59:42:d6:18:95:
        3f:a6:1f:10:64:6f:97:2f:e8:83:d1:05:e8:67:fa:5a:
        2a:03:e3:d2:16:ea:d9:2d:10:e2:48:b9:f7:38:64:b2:
        a9:8c:ef:3f:13:bb:0f:1c:cd:2e:8e:74:65:c3:da:b8:
        a5:71:80:02:79:93:d5:52:24:c3:11:44:2b:d7:7a:fe:
        8e:47:39:ff:68:4c:8e:a0:64:0e:a5:aa:94:83:5a:ec:
        71:92:dd:3b:93:d8:c3:33:d5:3b:30:78:58:cb:53:61
    Fingerprint (SHA-256):
        08:EA:DA:E1:AD:11:8C:B2:9F:A9:90:9B:AA:39:40:B8:C1:48:F1:09:9E:3D:C3:5A:5E:5E:C2:8C:18:57:67:5F
    Fingerprint (SHA1):
        6B:F5:BB:93:BC:77:2B:B4:C0:F0:6D:CF:09:AC:90:B0:DF:1C:F9:5B

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5276: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp       -t RootCA - PASSED
chains.sh: Creating DB TrustOnlyDB
certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd
chains.sh: #5277: TrustAnchors: Creating DB TrustOnlyDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp       -t RootCA.der
vfychain -d TrustOnlyDB -pp -vv       EE1CA2.der CA2CA1.der CA1RootCA.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185400 (0x1ef223f8)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:46:57 2017
            Not After : Thu May 19 19:46:57 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e8:5f:9f:95:b8:e5:9f:6f:96:bc:42:88:3f:f9:5f:e0:
                    53:f2:b6:0b:a4:56:1a:be:c1:55:ea:6e:b0:2f:de:b7:
                    07:69:d3:ea:a9:df:81:d9:61:bd:c9:b6:f9:b8:20:d5:
                    da:b0:8e:f6:0b:5f:36:97:87:db:f1:61:c1:06:46:f0:
                    80:3b:3e:fc:b7:64:93:8b:d0:cd:c5:4b:eb:97:9c:da:
                    af:b1:90:70:7a:5a:80:af:5d:34:be:2e:f9:29:b0:20:
                    09:43:4c:38:a9:87:86:b4:5f:e9:83:76:81:df:7d:a4:
                    65:c3:e5:9d:04:ba:c1:3a:49:bf:7b:67:81:3f:ae:5f:
                    61:d0:83:b3:65:f3:22:cc:35:5f:36:22:01:8a:47:bf:
                    30:0b:96:68:39:12:b0:e6:88:7f:23:e6:69:de:e4:b6:
                    5d:ef:5e:5d:d4:ad:58:9b:1d:78:de:a2:f2:23:23:fc:
                    2b:0b:c8:27:0e:ae:2d:bc:19:5c:3c:21:26:d9:f8:92:
                    78:69:21:fd:25:90:30:68:9d:94:3b:40:7b:54:2b:7e:
                    be:ca:b7:40:f4:aa:22:80:e7:51:d4:ec:5d:11:1a:ea:
                    a7:ba:85:75:c9:68:6b:f4:6b:61:d8:be:f2:11:5a:7b:
                    fc:8d:49:e4:ea:56:0e:97:78:e0:c2:7d:bc:53:0a:bf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        d1:f8:ac:09:b7:b3:d4:bb:c2:47:55:26:fc:cb:53:26:
        b7:7c:ef:13:07:75:06:f4:82:4e:28:38:3a:c7:52:be:
        68:7a:a0:0d:07:de:95:36:8f:69:67:0d:79:4d:86:8a:
        44:73:5c:65:d4:1b:be:7d:c5:13:6e:a5:61:e9:89:27:
        d7:01:93:f9:ca:9c:dc:19:62:db:c9:f1:5d:c7:b8:1d:
        ce:ed:a3:6d:a0:c0:b6:eb:4e:a2:57:86:7c:bb:f1:6a:
        cd:37:f9:76:74:19:7d:d3:a9:df:25:d2:f2:ca:5e:c4:
        de:5f:cc:78:77:a9:21:94:6c:c3:b1:e3:b6:c4:a1:f1:
        1f:be:30:22:ab:6c:94:5d:0a:48:b1:f6:b9:40:f7:6c:
        c7:ce:02:fe:c9:57:62:e0:87:45:25:59:42:d6:18:95:
        3f:a6:1f:10:64:6f:97:2f:e8:83:d1:05:e8:67:fa:5a:
        2a:03:e3:d2:16:ea:d9:2d:10:e2:48:b9:f7:38:64:b2:
        a9:8c:ef:3f:13:bb:0f:1c:cd:2e:8e:74:65:c3:da:b8:
        a5:71:80:02:79:93:d5:52:24:c3:11:44:2b:d7:7a:fe:
        8e:47:39:ff:68:4c:8e:a0:64:0e:a5:aa:94:83:5a:ec:
        71:92:dd:3b:93:d8:c3:33:d5:3b:30:78:58:cb:53:61
    Fingerprint (SHA-256):
        08:EA:DA:E1:AD:11:8C:B2:9F:A9:90:9B:AA:39:40:B8:C1:48:F1:09:9E:3D:C3:5A:5E:5E:C2:8C:18:57:67:5F
    Fingerprint (SHA1):
        6B:F5:BB:93:BC:77:2B:B4:C0:F0:6D:CF:09:AC:90:B0:DF:1C:F9:5B


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5278: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp       -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der with flags -d TrustOnlyDB -pp       -t CA2CA1.der
vfychain -d TrustOnlyDB -pp -vv       EE1CA2.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185402 (0x1ef223fa)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Fri May 19 19:47:27 2017
            Not After : Thu May 19 19:47:27 2022
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d3:53:42:d4:8b:f6:cc:59:b4:f7:1d:3f:5c:65:8f:d8:
                    15:c1:ee:06:5b:6e:01:a8:a6:23:4a:46:2b:18:72:e0:
                    f1:e6:23:f5:08:66:d7:fd:ed:53:b6:71:b4:1d:92:4d:
                    ae:b4:2e:61:e6:34:1f:28:eb:da:8c:20:bf:ae:93:a2:
                    6e:5d:5f:51:2f:15:a0:e3:3e:65:bf:ca:97:9d:55:0c:
                    a2:74:12:f8:e3:04:4c:ee:d8:c0:02:07:7d:e4:64:ac:
                    47:29:34:27:9d:25:43:e0:ad:55:f8:88:a2:04:dd:88:
                    14:88:36:c0:28:7a:24:17:6c:4b:a8:96:25:e0:76:72:
                    86:1d:07:f0:fb:03:71:c7:6e:bb:48:8b:17:a1:04:e0:
                    7a:5f:92:97:23:23:f1:52:03:f1:c2:66:0c:ad:ca:3f:
                    91:23:16:23:6b:2c:f2:6d:ad:42:21:db:4d:0a:6c:95:
                    66:42:b9:17:42:46:2f:e9:de:98:d9:6c:42:55:b5:98:
                    08:32:30:88:a3:82:eb:f6:37:2f:c2:02:91:e5:d2:69:
                    fb:d8:e7:b1:9d:e4:c9:4b:bc:c2:1f:19:7d:0e:cd:45:
                    15:ec:f0:94:20:d5:f5:ac:a9:70:eb:80:2c:72:d4:1d:
                    19:8d:c8:c2:a0:68:b4:95:e8:75:c9:e9:2d:08:71:43
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        9e:65:d8:a7:37:21:62:89:b9:30:38:81:5f:df:22:86:
        96:c5:81:2f:65:a5:eb:6f:7f:96:3e:77:be:57:47:3e:
        78:e9:09:69:92:03:15:ec:7f:39:2b:aa:6a:4e:8e:bf:
        23:d0:bd:3f:f9:93:e6:bf:f6:0d:c1:27:3e:95:83:0f:
        62:69:89:c5:26:23:2f:9c:55:7e:db:56:47:de:b8:ba:
        a5:44:36:d7:84:14:ad:ac:b6:3b:22:3a:ed:08:85:55:
        e4:e5:7a:da:d4:36:02:c8:df:a3:8b:cc:fb:80:4e:2b:
        80:69:6d:92:cb:e1:5b:20:cb:a5:57:4a:80:04:2a:1e:
        2f:ee:f6:73:f5:db:73:0d:9f:c0:43:f2:9b:b2:8e:fd:
        f5:7c:bb:10:cf:db:a8:b3:f7:2d:05:4e:63:05:7f:a7:
        b3:6e:b9:39:5e:db:86:cf:51:e2:e4:6e:6b:bc:62:42:
        dd:f8:b3:03:3c:1a:bc:d8:32:17:ad:45:f6:fc:f9:9e:
        40:b9:dd:9e:06:4f:60:b3:55:e5:d8:66:f6:95:09:16:
        82:a5:28:17:3d:c7:b2:01:5a:15:b9:47:68:ee:7b:84:
        a2:79:07:9e:45:45:1d:b7:3c:8c:ee:f1:e4:0c:fc:fb:
        b5:87:cd:50:a4:12:a5:4c:83:4f:dd:2f:20:ae:63:27
    Fingerprint (SHA-256):
        C9:DC:A2:BF:56:C7:94:80:29:F6:82:41:E3:F2:D9:AC:30:5E:98:B7:27:87:70:06:9C:2F:AA:D3:6D:EA:83:F9
    Fingerprint (SHA1):
        66:9D:E9:F9:92:8E:62:FA:C3:17:24:23:9A:5B:0A:6F:7B:CA:C2:95


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5279: TrustAnchors: Verifying certificate(s)  EE1CA2.der with flags -d TrustOnlyDB -pp       -t CA2CA1.der - PASSED
chains.sh: Creating DB TrustAndDBDB
certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd
chains.sh: #5280: TrustAnchors: Creating DB TrustAndDBDB  - PASSED
chains.sh: Importing certificate RootCA.der to TrustAndDBDB database
certutil -A -n RootCA  -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der
chains.sh: #5281: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database
certutil -A -n CA1  -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der
chains.sh: #5282: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp      
vfychain -d TrustAndDBDB -pp -vv       EE1CA2.der CA2CA1.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185400 (0x1ef223f8)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:46:57 2017
            Not After : Thu May 19 19:46:57 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e8:5f:9f:95:b8:e5:9f:6f:96:bc:42:88:3f:f9:5f:e0:
                    53:f2:b6:0b:a4:56:1a:be:c1:55:ea:6e:b0:2f:de:b7:
                    07:69:d3:ea:a9:df:81:d9:61:bd:c9:b6:f9:b8:20:d5:
                    da:b0:8e:f6:0b:5f:36:97:87:db:f1:61:c1:06:46:f0:
                    80:3b:3e:fc:b7:64:93:8b:d0:cd:c5:4b:eb:97:9c:da:
                    af:b1:90:70:7a:5a:80:af:5d:34:be:2e:f9:29:b0:20:
                    09:43:4c:38:a9:87:86:b4:5f:e9:83:76:81:df:7d:a4:
                    65:c3:e5:9d:04:ba:c1:3a:49:bf:7b:67:81:3f:ae:5f:
                    61:d0:83:b3:65:f3:22:cc:35:5f:36:22:01:8a:47:bf:
                    30:0b:96:68:39:12:b0:e6:88:7f:23:e6:69:de:e4:b6:
                    5d:ef:5e:5d:d4:ad:58:9b:1d:78:de:a2:f2:23:23:fc:
                    2b:0b:c8:27:0e:ae:2d:bc:19:5c:3c:21:26:d9:f8:92:
                    78:69:21:fd:25:90:30:68:9d:94:3b:40:7b:54:2b:7e:
                    be:ca:b7:40:f4:aa:22:80:e7:51:d4:ec:5d:11:1a:ea:
                    a7:ba:85:75:c9:68:6b:f4:6b:61:d8:be:f2:11:5a:7b:
                    fc:8d:49:e4:ea:56:0e:97:78:e0:c2:7d:bc:53:0a:bf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        d1:f8:ac:09:b7:b3:d4:bb:c2:47:55:26:fc:cb:53:26:
        b7:7c:ef:13:07:75:06:f4:82:4e:28:38:3a:c7:52:be:
        68:7a:a0:0d:07:de:95:36:8f:69:67:0d:79:4d:86:8a:
        44:73:5c:65:d4:1b:be:7d:c5:13:6e:a5:61:e9:89:27:
        d7:01:93:f9:ca:9c:dc:19:62:db:c9:f1:5d:c7:b8:1d:
        ce:ed:a3:6d:a0:c0:b6:eb:4e:a2:57:86:7c:bb:f1:6a:
        cd:37:f9:76:74:19:7d:d3:a9:df:25:d2:f2:ca:5e:c4:
        de:5f:cc:78:77:a9:21:94:6c:c3:b1:e3:b6:c4:a1:f1:
        1f:be:30:22:ab:6c:94:5d:0a:48:b1:f6:b9:40:f7:6c:
        c7:ce:02:fe:c9:57:62:e0:87:45:25:59:42:d6:18:95:
        3f:a6:1f:10:64:6f:97:2f:e8:83:d1:05:e8:67:fa:5a:
        2a:03:e3:d2:16:ea:d9:2d:10:e2:48:b9:f7:38:64:b2:
        a9:8c:ef:3f:13:bb:0f:1c:cd:2e:8e:74:65:c3:da:b8:
        a5:71:80:02:79:93:d5:52:24:c3:11:44:2b:d7:7a:fe:
        8e:47:39:ff:68:4c:8e:a0:64:0e:a5:aa:94:83:5a:ec:
        71:92:dd:3b:93:d8:c3:33:d5:3b:30:78:58:cb:53:61
    Fingerprint (SHA-256):
        08:EA:DA:E1:AD:11:8C:B2:9F:A9:90:9B:AA:39:40:B8:C1:48:F1:09:9E:3D:C3:5A:5E:5E:C2:8C:18:57:67:5F
    Fingerprint (SHA1):
        6B:F5:BB:93:BC:77:2B:B4:C0:F0:6D:CF:09:AC:90:B0:DF:1C:F9:5B

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5283: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp       - PASSED
chains.sh: Verifying certificate(s)  EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp       -t OtherRoot.der
vfychain -d TrustAndDBDB -pp -vv       EE2OtherIntermediate.der OtherIntermediateOtherRoot.der  -t OtherRoot.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185404 (0x1ef223fc)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US"
        Validity:
            Not Before: Fri May 19 19:47:49 2017
            Not After : Thu May 19 19:47:49 2067
        Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ef:2c:ff:5b:db:de:dd:7a:0c:b2:dc:bd:56:c6:f8:5c:
                    fe:08:56:bb:f6:52:58:85:91:36:ba:de:04:4c:8a:d3:
                    6f:99:81:95:fd:5d:58:97:4c:08:72:39:7b:e8:1e:ba:
                    d7:db:d4:ff:92:dd:83:16:b1:b6:77:f2:4f:77:fd:30:
                    63:b0:f8:6a:3c:d6:28:58:1f:89:a1:88:3b:22:3f:bb:
                    3a:dd:30:77:50:d1:7b:66:2b:5d:f8:f2:e3:91:66:dd:
                    99:78:da:8a:a4:f5:4c:3a:3d:cb:21:d6:75:77:e3:49:
                    66:e0:1b:9b:15:bc:81:dc:6b:81:fb:a1:73:36:1c:b5:
                    32:61:04:ca:73:63:3c:33:7b:cb:8c:7d:b4:74:10:01:
                    3b:69:d0:08:a1:48:eb:c3:38:a5:2d:f5:cc:78:50:8c:
                    a3:94:d9:50:cf:69:ba:6a:0f:27:00:dc:08:ba:ba:b3:
                    ed:6b:b4:eb:f4:85:da:af:ed:25:d5:ee:0f:f1:ce:b2:
                    c8:c1:64:f4:82:7a:99:10:32:69:96:ef:07:fc:d5:51:
                    07:10:30:a6:f5:f4:00:88:99:b1:fc:e5:9e:50:87:d0:
                    b2:71:54:00:f2:86:b5:19:93:88:be:2e:db:4d:c6:27:
                    e1:80:b1:5c:ad:36:ac:b7:5b:ec:0d:5a:31:d9:e2:97
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        3c:81:fd:2d:a7:ea:37:f4:34:91:a6:cc:61:ba:59:2c:
        a4:3f:15:53:d8:0f:9a:5a:79:0b:61:8e:77:4c:09:7b:
        a8:20:93:ce:e0:52:e8:18:00:07:d6:f9:ac:80:c1:b4:
        fd:33:ca:f7:24:83:99:65:48:0d:0d:df:55:af:08:b1:
        f4:c3:51:36:db:47:44:54:90:1a:77:cc:67:cb:ae:7a:
        73:96:3d:c5:1d:aa:e8:27:07:42:22:3d:03:6b:6c:f8:
        1a:95:2a:f5:17:6b:0b:43:9a:09:d9:45:d6:d4:b0:44:
        26:cd:d3:c8:46:17:46:12:62:5b:41:32:6b:56:41:26:
        ac:7f:a2:b5:4e:ab:b6:dc:1b:2a:94:70:df:a1:56:76:
        e0:c8:38:1b:e9:33:70:71:f1:b7:83:57:99:4b:a3:18:
        31:27:07:dc:52:bf:14:04:01:c3:32:bd:b4:2a:b4:99:
        23:83:7d:7e:88:6d:a2:e4:c1:4a:da:8e:83:c8:36:b1:
        ae:a0:df:c5:57:a7:0c:2a:72:ab:26:a5:2a:55:a4:13:
        68:ef:9e:3e:a3:56:b2:66:22:8e:02:76:86:0c:50:0f:
        c8:e3:04:1f:43:24:b3:c7:29:ce:c2:85:02:b1:cc:78:
        cf:8b:09:4c:89:94:f6:a9:24:4b:cd:fa:a4:04:13:05
    Fingerprint (SHA-256):
        45:A9:F0:1A:71:41:E3:7A:42:AE:91:98:7E:5B:0C:03:44:FD:BC:22:DA:19:F9:73:C1:F0:F3:38:1B:5D:34:FC
    Fingerprint (SHA1):
        F4:F1:F8:95:07:B9:6C:2F:E5:8C:D6:B1:41:E4:36:E0:F4:BE:CF:7F


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate
    ,C=US"
Returned value is 0, expected result is pass
chains.sh: #5284: TrustAnchors: Verifying certificate(s)  EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp       -t OtherRoot.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T      -t OtherIntermediateOtherRoot.der -t OtherRoot.der
vfychain -d TrustAndDBDB -pp -vv -T      EE1CA2.der CA2CA1.der  -t OtherIntermediateOtherRoot.der -t OtherRoot.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185400 (0x1ef223f8)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Fri May 19 19:46:57 2017
            Not After : Thu May 19 19:46:57 2067
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e8:5f:9f:95:b8:e5:9f:6f:96:bc:42:88:3f:f9:5f:e0:
                    53:f2:b6:0b:a4:56:1a:be:c1:55:ea:6e:b0:2f:de:b7:
                    07:69:d3:ea:a9:df:81:d9:61:bd:c9:b6:f9:b8:20:d5:
                    da:b0:8e:f6:0b:5f:36:97:87:db:f1:61:c1:06:46:f0:
                    80:3b:3e:fc:b7:64:93:8b:d0:cd:c5:4b:eb:97:9c:da:
                    af:b1:90:70:7a:5a:80:af:5d:34:be:2e:f9:29:b0:20:
                    09:43:4c:38:a9:87:86:b4:5f:e9:83:76:81:df:7d:a4:
                    65:c3:e5:9d:04:ba:c1:3a:49:bf:7b:67:81:3f:ae:5f:
                    61:d0:83:b3:65:f3:22:cc:35:5f:36:22:01:8a:47:bf:
                    30:0b:96:68:39:12:b0:e6:88:7f:23:e6:69:de:e4:b6:
                    5d:ef:5e:5d:d4:ad:58:9b:1d:78:de:a2:f2:23:23:fc:
                    2b:0b:c8:27:0e:ae:2d:bc:19:5c:3c:21:26:d9:f8:92:
                    78:69:21:fd:25:90:30:68:9d:94:3b:40:7b:54:2b:7e:
                    be:ca:b7:40:f4:aa:22:80:e7:51:d4:ec:5d:11:1a:ea:
                    a7:ba:85:75:c9:68:6b:f4:6b:61:d8:be:f2:11:5a:7b:
                    fc:8d:49:e4:ea:56:0e:97:78:e0:c2:7d:bc:53:0a:bf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        d1:f8:ac:09:b7:b3:d4:bb:c2:47:55:26:fc:cb:53:26:
        b7:7c:ef:13:07:75:06:f4:82:4e:28:38:3a:c7:52:be:
        68:7a:a0:0d:07:de:95:36:8f:69:67:0d:79:4d:86:8a:
        44:73:5c:65:d4:1b:be:7d:c5:13:6e:a5:61:e9:89:27:
        d7:01:93:f9:ca:9c:dc:19:62:db:c9:f1:5d:c7:b8:1d:
        ce:ed:a3:6d:a0:c0:b6:eb:4e:a2:57:86:7c:bb:f1:6a:
        cd:37:f9:76:74:19:7d:d3:a9:df:25:d2:f2:ca:5e:c4:
        de:5f:cc:78:77:a9:21:94:6c:c3:b1:e3:b6:c4:a1:f1:
        1f:be:30:22:ab:6c:94:5d:0a:48:b1:f6:b9:40:f7:6c:
        c7:ce:02:fe:c9:57:62:e0:87:45:25:59:42:d6:18:95:
        3f:a6:1f:10:64:6f:97:2f:e8:83:d1:05:e8:67:fa:5a:
        2a:03:e3:d2:16:ea:d9:2d:10:e2:48:b9:f7:38:64:b2:
        a9:8c:ef:3f:13:bb:0f:1c:cd:2e:8e:74:65:c3:da:b8:
        a5:71:80:02:79:93:d5:52:24:c3:11:44:2b:d7:7a:fe:
        8e:47:39:ff:68:4c:8e:a0:64:0e:a5:aa:94:83:5a:ec:
        71:92:dd:3b:93:d8:c3:33:d5:3b:30:78:58:cb:53:61
    Fingerprint (SHA-256):
        08:EA:DA:E1:AD:11:8C:B2:9F:A9:90:9B:AA:39:40:B8:C1:48:F1:09:9E:3D:C3:5A:5E:5E:C2:8C:18:57:67:5F
    Fingerprint (SHA1):
        6B:F5:BB:93:BC:77:2B:B4:C0:F0:6D:CF:09:AC:90:B0:DF:1C:F9:5B

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #5285: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T      -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED
chains.sh: Creating DB ExplicitDistrustDB
certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd
chains.sh: #5286: TrustAnchors: Creating DB ExplicitDistrustDB  - PASSED
chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database
certutil -A -n RootCA  -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der
chains.sh: #5287: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database
certutil -A -n CA1  -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der
chains.sh: #5288: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database  - PASSED
chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database
certutil -A -n OtherRoot  -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der
chains.sh: #5289: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp       -t CA1RootCA.der
vfychain -d ExplicitDistrustDB -pp -vv       EE1CA2.der CA2CA1.der  -t CA1RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8171: Peer's certificate has been marked as not trusted by the user.
Returned value is 1, expected result is fail
chains.sh: #5290: TrustAnchors: Verifying certificate(s)  EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp       -t CA1RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp       -t OtherIntermediateOtherRoot.der
vfychain -d ExplicitDistrustDB -pp -vv       EE2OtherIntermediate.der  -t OtherIntermediateOtherRoot.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 519185405 (0x1ef223fd)
        Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
        Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US"
        Validity:
            Not Before: Fri May 19 19:47:58 2017
            Not After : Thu May 19 19:47:58 2022
        Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d6:b0:02:48:99:e6:cd:5a:cf:43:99:7f:6c:a0:e4:11:
                    1b:eb:b5:85:97:7d:8b:f1:66:71:97:e2:50:e7:ac:a3:
                    71:98:e9:ad:d2:8c:a2:d5:5a:33:75:f3:52:88:fe:70:
                    d1:1e:6c:9f:8d:cf:1f:cf:73:ce:12:02:37:9c:51:f1:
                    07:01:27:df:94:92:30:13:b0:e1:29:9e:c8:72:ea:35:
                    d6:2a:b3:86:71:64:88:1a:92:5d:bc:34:bb:77:9f:f1:
                    45:35:75:80:97:20:90:4f:0d:e9:32:7e:83:ac:63:cd:
                    02:8e:2a:9c:79:e1:6d:da:78:6a:dd:d2:ce:94:ba:5b:
                    e3:b3:c2:fb:31:10:81:7c:0e:b2:0d:3f:25:0a:d9:ec:
                    5f:69:6d:0f:6d:1a:26:5f:4d:71:71:77:62:dd:1c:f0:
                    74:8d:29:23:93:be:76:db:bc:a6:dd:d1:7e:32:0a:b8:
                    c1:b5:fd:0b:4f:57:60:08:5d:93:02:83:01:19:15:9a:
                    58:ed:50:d6:24:d7:e0:7f:29:5a:0b:a8:7a:ad:b5:5d:
                    6a:45:aa:b3:ef:0f:c3:71:f6:3d:1f:39:a9:a2:ea:2e:
                    77:91:d8:65:b1:10:31:69:6a:97:64:cf:2a:76:20:28:
                    5a:0a:ef:50:9d:42:ab:a0:e0:e4:79:a0:c8:89:09:6f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
    Signature:
        ae:8f:b1:f1:19:60:a3:b0:3a:6c:19:cd:00:c3:c0:a0:
        ea:25:05:c8:bc:96:6c:39:6d:78:38:6d:80:10:ec:23:
        c7:b0:8d:ca:47:e9:2b:5a:89:52:9f:27:2c:92:60:dc:
        57:70:1d:a9:ba:af:b8:13:19:3c:f5:98:7d:0d:1b:dd:
        39:a9:a8:d7:e0:6e:3e:d2:ad:10:62:36:53:bd:ee:e7:
        db:33:a4:e1:e5:8a:b9:db:13:fa:56:38:a6:1b:29:ed:
        e8:ac:e2:a5:e0:71:fd:56:f9:58:d5:bb:47:7b:f3:53:
        b5:c1:50:66:cf:8d:8f:c5:7d:93:1e:fc:09:ae:46:de:
        a7:20:4c:71:10:a8:be:07:4c:bc:53:ba:85:7a:3a:c6:
        64:77:49:7f:5f:70:1d:4a:c8:bd:33:ab:ec:58:59:ec:
        fc:37:7e:2b:a6:4a:7b:60:38:9a:ca:08:0a:f0:70:f4:
        4d:32:58:05:d5:87:dc:3b:4d:b8:f6:2b:33:f2:d1:a9:
        36:3c:da:f2:68:46:7c:22:d8:39:19:9d:e2:50:0f:32:
        f9:cd:26:88:81:67:8c:2f:7b:9c:c3:ee:a4:1e:cf:94:
        96:52:cd:b0:19:1e:05:16:3a:ca:7f:1a:ce:30:dd:dd:
        55:34:e9:56:bc:94:69:33:92:23:15:24:6a:52:78:09
    Fingerprint (SHA-256):
        46:BB:4F:41:C9:D6:A5:65:16:C3:67:D3:09:8C:11:EA:95:2E:16:2D:AC:51:D7:B1:F6:83:3F:26:89:E0:DE:9A
    Fingerprint (SHA1):
        46:EB:64:86:A4:DE:B7:0E:DD:E6:1D:7C:4D:4C:75:60:88:9B:7E:9D


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Returned value is 0, expected result is pass
chains.sh: #5291: Verifying certificate(s)  EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp       -t OtherIntermediateOtherRoot.der - PASSED
chains.sh: Creating DB trustanchorsDB
certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd
chains.sh: #5292: TrustAnchors: Creating DB trustanchorsDB  - PASSED
chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database
certutil -A -n NameConstraints.ca  -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.ca.cert
chains.sh: #5293: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database  - PASSED
chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database
certutil -A -n NameConstraints.ncca  -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.ncca.cert
chains.sh: #5294: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database  - PASSED
chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database
certutil -A -n NameConstraints.dcisscopy  -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert
chains.sh: #5295: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database  - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server1.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]:
  ERROR -8174: security library: bad database.
Returned value is 1, expected result is fail
chains.sh: #5296: TrustAnchors: Verifying certificate(s)  NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server2.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #5297: TrustAnchors: Verifying certificate(s)  NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server3.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo
    rnia,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST
    =California,C=US"
Returned value is 0, expected result is pass
chains.sh: #5298: TrustAnchors: Verifying certificate(s)  NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]:
  ERROR -8174: security library: bad database.
Returned value is 1, expected result is fail
chains.sh: #5299: TrustAnchors: Verifying certificate(s)  NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server5.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #5300: TrustAnchors: Verifying certificate(s)  NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server6.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif
    ornia,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View,
    ST=California,C=US"
Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST
    =California,C=US"
Returned value is 0, expected result is pass
chains.sh: #5301: TrustAnchors: Verifying certificate(s)  NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server7.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US"
Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S
    T=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #5302: TrustAnchors: Verifying certificate(s)  NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server8.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US"
Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S
    T=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #5303: TrustAnchors: Verifying certificate(s)  NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server9.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]:
  ERROR -8174: security library: bad database.
Returned value is 1, expected result is fail
chains.sh: #5304: TrustAnchors: Verifying certificate(s)  NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server10.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #5305: TrustAnchors: Verifying certificate(s)  NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server11.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Dec 04 01:22:58 2013
            Not After : Mon Dec 04 01:22:58 2023
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49:
                    0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03:
                    7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c:
                    c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4:
                    0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1:
                    75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26:
                    7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f:
                    be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21:
        a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03:
        2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99:
        b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8:
        30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24:
        fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6:
        5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca:
        f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95
    Fingerprint (SHA-256):
        A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1
    Fingerprint (SHA1):
        56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US"
Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S
    T=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #5306: TrustAnchors: Verifying certificate(s)  NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server12.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #5307: TrustAnchors: Verifying certificate(s)  NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server13.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]:
  ERROR -8174: security library: bad database.
Returned value is 1, expected result is fail
chains.sh: #5308: TrustAnchors: Verifying certificate(s)  NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server14.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. NameConstraints.ca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #5309: TrustAnchors: Verifying certificate(s)  NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server15.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. NameConstraints.ncca [Certificate Authority]:
  ERROR -8157: Certificate extension not found.
Returned value is 1, expected result is fail
chains.sh: #5310: TrustAnchors: Verifying certificate(s)  NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server16.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. NameConstraints.ncca [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #5311: TrustAnchors: Verifying certificate(s)  NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.server17.cert /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 2 (0x2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View,
            ST=CA,C=US"
        Validity:
            Not Before: Sat Jan 04 01:22:59 2014
            Not After : Sat Nov 04 01:22:59 2023
        Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View
            ,ST=CA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28:
                    c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4:
                    71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04:
                    4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba:
                    ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9:
                    f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85:
                    49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34:
                    a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Name Constraints
            Permitted Subtree:
                DNS name: ".example"
                    Minimum: 0 (0x0)

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91:
        33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89:
        3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a:
        9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df:
        46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b:
        c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e:
        5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd:
        df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34
    Fingerprint (SHA-256):
        63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29
    Fingerprint (SHA1):
        56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif
    ornia,C=US"
Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US"
Returned value is 0, expected result is pass
chains.sh: #5312: TrustAnchors: Verifying certificate(s)  NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. NameConstraints.dcisscopy [Certificate Authority]:
Email Address(es): igca@sgdn.pm.gouv.fr
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
Returned value is 1, expected result is fail
chains.sh: #5313: TrustAnchors: Verifying certificate(s)  NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp       - PASSED
chains.sh: Verifying certificate(s)  NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp      
vfychain -d trustanchorsDB -pp -vv       /<<PKGBUILDDIR>>/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 998899 (0xf3df3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S
            T=France,C=FR"
        Validity:
            Not Before: Sun Feb 02 17:21:27 2014
            Not After : Fri Feb 02 17:21:27 2024
        Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,
            ST=France,C=FR"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7:
                    bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed:
                    19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f:
                    1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54:
                    ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9:
                    b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a:
                    a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66:
                    de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce:
                    5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf:
                    b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01:
                    5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10:
                    10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73:
                    29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0:
                    e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26:
                    82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c:
                    65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9:
        c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a:
        b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f:
        f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43:
        2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d:
        f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3:
        a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4:
        9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04:
        82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c:
        5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e:
        bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2:
        18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1:
        f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d:
        b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db:
        9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65:
        2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b
    Fingerprint (SHA-256):
        C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C
    Fingerprint (SHA1):
        48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US"
Returned value is 0, expected result is pass
chains.sh: #5314: TrustAnchors: Verifying certificate(s)  NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp       - PASSED
trying to kill httpserv with PID 32556 at Fri May 19 19:48:13 UTC 2017
kill -USR1 32556
httpserv: normal termination
httpserv -b -p 8641 2>/dev/null;
httpserv with PID 32556 killed at Fri May 19 19:48:13 UTC 2017
TIMESTAMP chains END: Fri May 19 19:48:13 UTC 2017
Running tests for ec
TIMESTAMP ec BEGIN: Fri May 19 19:48:13 UTC 2017
Running ec tests for ecperf
TIMESTAMP ecperf BEGIN: Fri May 19 19:48:13 UTC 2017
ecperf.sh: ecperf test ===============================
ecperf.sh: #5315: ec(perf) test - PASSED
chmod: missing operand after `a+rw'
Try `chmod --help' for more information.
TIMESTAMP ecperf END: Fri May 19 19:48:35 UTC 2017
Running ec tests for ectest
TIMESTAMP ectest BEGIN: Fri May 19 19:48:35 UTC 2017
ectest.sh: ectest test ===============================
ectest.sh: #5316: ec(test) test - PASSED
chmod: missing operand after `a+rw'
Try `chmod --help' for more information.
TIMESTAMP ectest END: Fri May 19 19:48:38 UTC 2017
TIMESTAMP ec END: Fri May 19 19:48:38 UTC 2017
Running tests for gtests
TIMESTAMP gtests BEGIN: Fri May 19 19:48:39 UTC 2017
gtests: der_gtest pk11_gtest util_gtest
gtests.sh: der_gtest ===============================
[==========] Running 11 tests from 1 test case.
[----------] Global test environment set-up.
[----------] 11 tests from DERIntegerDecodingTest
[ RUN      ] DERIntegerDecodingTest.DecodeLongMinus126
[       OK ] DERIntegerDecodingTest.DecodeLongMinus126 (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLong130
[       OK ] DERIntegerDecodingTest.DecodeLong130 (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLong0
[       OK ] DERIntegerDecodingTest.DecodeLong0 (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLong1
[       OK ] DERIntegerDecodingTest.DecodeLong1 (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLongMinus1
[       OK ] DERIntegerDecodingTest.DecodeLongMinus1 (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLongMax
[       OK ] DERIntegerDecodingTest.DecodeLongMax (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLongMin
[       OK ] DERIntegerDecodingTest.DecodeLongMin (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLongMaxMinus1
[       OK ] DERIntegerDecodingTest.DecodeLongMaxMinus1 (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLongMinPlus1
[       OK ] DERIntegerDecodingTest.DecodeLongMinPlus1 (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLongMinMinus1
[       OK ] DERIntegerDecodingTest.DecodeLongMinMinus1 (0 ms)
[ RUN      ] DERIntegerDecodingTest.DecodeLongMaxPlus1
[       OK ] DERIntegerDecodingTest.DecodeLongMaxPlus1 (0 ms)
[----------] 11 tests from DERIntegerDecodingTest (8 ms total)

[----------] Global test environment tear-down
[==========] 11 tests from 1 test case ran. (10 ms total)
[  PASSED  ] 11 tests.
test output dir: /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/der_gtest/report.xml
gtests.sh: #5317: der_gtest run successfully  - PASSED
gtests.sh: pk11_gtest ===============================
[==========] Running 19 tests from 6 test cases.
[----------] Global test environment set-up.
[----------] 6 tests from Pkcs11AESKeyWrapTest
[ RUN      ] Pkcs11AESKeyWrapTest.WrapUnwrepTest1
[       OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest1 (1 ms)
[ RUN      ] Pkcs11AESKeyWrapTest.WrapUnwrepTest2
[       OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest2 (0 ms)
[ RUN      ] Pkcs11AESKeyWrapTest.WrapUnwrepTest3
[       OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest3 (0 ms)
[ RUN      ] Pkcs11AESKeyWrapTest.WrapUnwrepTest4
[       OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest4 (0 ms)
[ RUN      ] Pkcs11AESKeyWrapTest.WrapUnwrepTest5
[       OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest5 (0 ms)
[ RUN      ] Pkcs11AESKeyWrapTest.WrapUnwrepTest6
[       OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest6 (0 ms)
[----------] 6 tests from Pkcs11AESKeyWrapTest (7 ms total)

[----------] 3 tests from Pkcs11ChaCha20Poly1305Test
[ RUN      ] Pkcs11ChaCha20Poly1305Test.GenerateEncryptDecrypt
[       OK ] Pkcs11ChaCha20Poly1305Test.GenerateEncryptDecrypt (1 ms)
[ RUN      ] Pkcs11ChaCha20Poly1305Test.CheckTestVector1
[       OK ] Pkcs11ChaCha20Poly1305Test.CheckTestVector1 (0 ms)
[ RUN      ] Pkcs11ChaCha20Poly1305Test.CheckTestVector2
[       OK ] Pkcs11ChaCha20Poly1305Test.CheckTestVector2 (0 ms)
[----------] 3 tests from Pkcs11ChaCha20Poly1305Test (4 ms total)

[----------] 2 tests from Pkcs11Pbkdf2Test
[ RUN      ] Pkcs11Pbkdf2Test.DeriveKnown1
[       OK ] Pkcs11Pbkdf2Test.DeriveKnown1 (262 ms)
[ RUN      ] Pkcs11Pbkdf2Test.DeriveKnown2
[       OK ] Pkcs11Pbkdf2Test.DeriveKnown2 (515 ms)
[----------] 2 tests from Pkcs11Pbkdf2Test (779 ms total)

[----------] 5 tests from TlsPrfTest
[ RUN      ] TlsPrfTest.ExtendedMsParamErr
[       OK ] TlsPrfTest.ExtendedMsParamErr (1 ms)
[ RUN      ] TlsPrfTest.ExtendedMsDhTlsPrf
[       OK ] TlsPrfTest.ExtendedMsDhTlsPrf (0 ms)
[ RUN      ] TlsPrfTest.ExtendedMsRsaTlsPrf
[       OK ] TlsPrfTest.ExtendedMsRsaTlsPrf (0 ms)
[ RUN      ] TlsPrfTest.ExtendedMsDhSha256
[       OK ] TlsPrfTest.ExtendedMsDhSha256 (0 ms)
[ RUN      ] TlsPrfTest.ExtendedMsRsaSha256
[       OK ] TlsPrfTest.ExtendedMsRsaSha256 (0 ms)
[----------] 5 tests from TlsPrfTest (6 ms total)

[----------] 1 test from Pkcs11RsaPssTest
[ RUN      ] Pkcs11RsaPssTest.GenerateAndSignAndVerify
[       OK ] Pkcs11RsaPssTest.GenerateAndSignAndVerify (469 ms)
[----------] 1 test from Pkcs11RsaPssTest (470 ms total)

[----------] 2 tests from Pkcs11RsaPssVectorTest
[ RUN      ] Pkcs11RsaPssVectorTest.VerifyKnownSignature1
[       OK ] Pkcs11RsaPssVectorTest.VerifyKnownSignature1 (0 ms)
[ RUN      ] Pkcs11RsaPssVectorTest.VerifyKnownSignature2
[       OK ] Pkcs11RsaPssVectorTest.VerifyKnownSignature2 (2 ms)
[----------] 2 tests from Pkcs11RsaPssVectorTest (5 ms total)

[----------] Global test environment tear-down
[==========] 19 tests from 6 test cases ran. (1279 ms total)
[  PASSED  ] 19 tests.
test output dir: /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/pk11_gtest/report.xml
gtests.sh: #5329: pk11_gtest run successfully  - PASSED
gtests.sh: util_gtest ===============================
[==========] Running 1927 tests from 9 test cases.
[----------] Global test environment set-up.
[----------] 4 tests from Utf8Zeroes
[ RUN      ] Utf8Zeroes.From32To8
[       OK ] Utf8Zeroes.From32To8 (0 ms)
[ RUN      ] Utf8Zeroes.From16To8
[       OK ] Utf8Zeroes.From16To8 (0 ms)
[ RUN      ] Utf8Zeroes.From8To32
[       OK ] Utf8Zeroes.From8To32 (0 ms)
[ RUN      ] Utf8Zeroes.From8To16
[       OK ] Utf8Zeroes.From8To16 (0 ms)
[----------] 4 tests from Utf8Zeroes (3 ms total)

[----------] 7 tests from B64EncodeDecodeTest
[ RUN      ] B64EncodeDecodeTest.DecEncTest
[       OK ] B64EncodeDecodeTest.DecEncTest (0 ms)
[ RUN      ] B64EncodeDecodeTest.EncDecTest
[       OK ] B64EncodeDecodeTest.EncDecTest (0 ms)
[ RUN      ] B64EncodeDecodeTest.FakeDecTest
[       OK ] B64EncodeDecodeTest.FakeDecTest (0 ms)
[ RUN      ] B64EncodeDecodeTest.FakeEncDecTest
[       OK ] B64EncodeDecodeTest.FakeEncDecTest (0 ms)
[ RUN      ] B64EncodeDecodeTest.LongFakeDecTest1
unknown file: Failure
C++ exception with description "basic_string::_S_create" thrown in the test body.
[  FAILED  ] B64EncodeDecodeTest.LongFakeDecTest1 (1 ms)
[ RUN      ] B64EncodeDecodeTest.LongFakeEncDecTest1
[       OK ] B64EncodeDecodeTest.LongFakeEncDecTest1 (2840 ms)
[ RUN      ] B64EncodeDecodeTest.LongFakeEncDecTest2
[       OK ] B64EncodeDecodeTest.LongFakeEncDecTest2 (2688 ms)
[----------] 7 tests from B64EncodeDecodeTest (5535 ms total)

[----------] 678 tests from Ucs4TestCases/Ucs4Test
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/0
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/0 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/1
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/1 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/2
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/2 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/3
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/3 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/4
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/4 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/5
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/5 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/6
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/6 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/7
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/7 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/8
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/8 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/9
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/9 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/10
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/10 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/11
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/11 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/12
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/12 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/13
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/13 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/14
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/14 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/15
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/15 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/16
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/16 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/17
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/17 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/18
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/18 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/19
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/19 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/20
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/20 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/21
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/21 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/22
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/22 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/23
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/23 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/24
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/24 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/25
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/25 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/26
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/26 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/27
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/27 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/28
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/28 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/29
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/29 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/30
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/30 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/31
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/31 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/32
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/32 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/33
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/33 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/34
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/34 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/35
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/35 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/36
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/36 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/37
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/37 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/38
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/38 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/39
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/39 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/40
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/40 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/41
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/41 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/42
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/42 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/43
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/43 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/44
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/44 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/45
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/45 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/46
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/46 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/47
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/47 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/48
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/48 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/49
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/49 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/50
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/50 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/51
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/51 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/52
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/52 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/53
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/53 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/54
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/54 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/55
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/55 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/56
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/56 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/57
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/57 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/58
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/58 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/59
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/59 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/60
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/60 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/61
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/61 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/62
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/62 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/63
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/63 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/64
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/64 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/65
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/65 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/66
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/66 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/67
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/67 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/68
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/68 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/69
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/69 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/70
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/70 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/71
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/71 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/72
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/72 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/73
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/73 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/74
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/74 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/75
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/75 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/76
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/76 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/77
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/77 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/78
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/78 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/79
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/79 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/80
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/80 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/81
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/81 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/82
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/82 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/83
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/83 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/84
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/84 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/85
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/85 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/86
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/86 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/87
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/87 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/88
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/88 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/89
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/89 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/90
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/90 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/91
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/91 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/92
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/92 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/93
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/93 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/94
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/94 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/95
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/95 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/96
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/96 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/97
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/97 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/98
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/98 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/99
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/99 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/100
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/100 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/101
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/101 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/102
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/102 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/103
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/103 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/104
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/104 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/105
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/105 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/106
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/106 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/107
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/107 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/108
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/108 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/109
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/109 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/110
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/110 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/111
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/111 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/112
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/112 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/113
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/113 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/114
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/114 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/115
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/115 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/116
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/116 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/117
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/117 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/118
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/118 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/119
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/119 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/120
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/120 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/121
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/121 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/122
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/122 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/123
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/123 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/124
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/124 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/125
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/125 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/126
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/126 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/127
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/127 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/128
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/128 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/129
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/129 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/130
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/130 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/131
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/131 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/132
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/132 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/133
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/133 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/134
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/134 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/135
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/135 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/136
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/136 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/137
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/137 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/138
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/138 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/139
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/139 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/140
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/140 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/141
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/141 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/142
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/142 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/143
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/143 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/144
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/144 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/145
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/145 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/146
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/146 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/147
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/147 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/148
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/148 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/149
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/149 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/150
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/150 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/151
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/151 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/152
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/152 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/153
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/153 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/154
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/154 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/155
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/155 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/156
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/156 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/157
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/157 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/158
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/158 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/159
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/159 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/160
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/160 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/161
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/161 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/162
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/162 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/163
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/163 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/164
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/164 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/165
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/165 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/166
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/166 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/167
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/167 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/168
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/168 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/169
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/169 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/170
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/170 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/171
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/171 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/172
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/172 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/173
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/173 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/174
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/174 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/175
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/175 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/176
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/176 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/177
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/177 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/178
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/178 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/179
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/179 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/180
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/180 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/181
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/181 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/182
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/182 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/183
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/183 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/184
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/184 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/185
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/185 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/186
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/186 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/187
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/187 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/188
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/188 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/189
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/189 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/190
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/190 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/191
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/191 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/192
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/192 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/193
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/193 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/194
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/194 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/195
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/195 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/196
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/196 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/197
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/197 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/198
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/198 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/199
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/199 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/200
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/200 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/201
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/201 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/202
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/202 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/203
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/203 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/204
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/204 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/205
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/205 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/206
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/206 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/207
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/207 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/208
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/208 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/209
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/209 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/210
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/210 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/211
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/211 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/212
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/212 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/213
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/213 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/214
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/214 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/215
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/215 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/216
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/216 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/217
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/217 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/218
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/218 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/219
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/219 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/220
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/220 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/221
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/221 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/222
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/222 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/223
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/223 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/224
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/224 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.ToUtf8/225
[       OK ] Ucs4TestCases/Ucs4Test.ToUtf8/225 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/0
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/0 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/1
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/1 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/2
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/2 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/3
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/3 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/4
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/4 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/5
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/5 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/6
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/6 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/7
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/7 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/8
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/8 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/9
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/9 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/10
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/10 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/11
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/11 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/12
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/12 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/13
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/13 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/14
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/14 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/15
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/15 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/16
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/16 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/17
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/17 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/18
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/18 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/19
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/19 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/20
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/20 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/21
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/21 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/22
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/22 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/23
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/23 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/24
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/24 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/25
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/25 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/26
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/26 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/27
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/27 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/28
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/28 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/29
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/29 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/30
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/30 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/31
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/31 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/32
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/32 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/33
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/33 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/34
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/34 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/35
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/35 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/36
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/36 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/37
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/37 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/38
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/38 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/39
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/39 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/40
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/40 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/41
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/41 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/42
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/42 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/43
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/43 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/44
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/44 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/45
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/45 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/46
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/46 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/47
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/47 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/48
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/48 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/49
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/49 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/50
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/50 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/51
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/51 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/52
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/52 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/53
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/53 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/54
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/54 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/55
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/55 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/56
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/56 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/57
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/57 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/58
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/58 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/59
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/59 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/60
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/60 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/61
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/61 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/62
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/62 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/63
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/63 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/64
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/64 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/65
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/65 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/66
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/66 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/67
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/67 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/68
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/68 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/69
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/69 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/70
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/70 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/71
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/71 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/72
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/72 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/73
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/73 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/74
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/74 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/75
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/75 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/76
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/76 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/77
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/77 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/78
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/78 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/79
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/79 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/80
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/80 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/81
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/81 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/82
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/82 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/83
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/83 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/84
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/84 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/85
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/85 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/86
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/86 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/87
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/87 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/88
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/88 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/89
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/89 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/90
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/90 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/91
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/91 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/92
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/92 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/93
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/93 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/94
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/94 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/95
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/95 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/96
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/96 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/97
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/97 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/98
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/98 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/99
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/99 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/100
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/100 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/101
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/101 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/102
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/102 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/103
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/103 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/104
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/104 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/105
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/105 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/106
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/106 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/107
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/107 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/108
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/108 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/109
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/109 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/110
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/110 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/111
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/111 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/112
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/112 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/113
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/113 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/114
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/114 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/115
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/115 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/116
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/116 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/117
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/117 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/118
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/118 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/119
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/119 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/120
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/120 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/121
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/121 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/122
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/122 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/123
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/123 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/124
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/124 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/125
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/125 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/126
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/126 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/127
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/127 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/128
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/128 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/129
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/129 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/130
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/130 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/131
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/131 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/132
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/132 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/133
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/133 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/134
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/134 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/135
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/135 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/136
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/136 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/137
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/137 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/138
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/138 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/139
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/139 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/140
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/140 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/141
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/141 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/142
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/142 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/143
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/143 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/144
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/144 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/145
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/145 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/146
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/146 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/147
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/147 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/148
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/148 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/149
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/149 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/150
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/150 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/151
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/151 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/152
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/152 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/153
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/153 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/154
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/154 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/155
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/155 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/156
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/156 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/157
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/157 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/158
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/158 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/159
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/159 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/160
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/160 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/161
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/161 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/162
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/162 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/163
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/163 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/164
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/164 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/165
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/165 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/166
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/166 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/167
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/167 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/168
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/168 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/169
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/169 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/170
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/170 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/171
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/171 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/172
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/172 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/173
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/173 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/174
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/174 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/175
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/175 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/176
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/176 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/177
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/177 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/178
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/178 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/179
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/179 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/180
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/180 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/181
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/181 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/182
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/182 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/183
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/183 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/184
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/184 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/185
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/185 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/186
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/186 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/187
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/187 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/188
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/188 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/189
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/189 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/190
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/190 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/191
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/191 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/192
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/192 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/193
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/193 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/194
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/194 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/195
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/195 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/196
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/196 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/197
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/197 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/198
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/198 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/199
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/199 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/200
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/200 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/201
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/201 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/202
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/202 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/203
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/203 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/204
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/204 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/205
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/205 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/206
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/206 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/207
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/207 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/208
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/208 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/209
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/209 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/210
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/210 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/211
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/211 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/212
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/212 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/213
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/213 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/214
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/214 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/215
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/215 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/216
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/216 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/217
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/217 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/218
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/218 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/219
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/219 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/220
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/220 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/221
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/221 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/222
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/222 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/223
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/223 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/224
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/224 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.FromUtf8/225
[       OK ] Ucs4TestCases/Ucs4Test.FromUtf8/225 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/0
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/0 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/1
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/1 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/2
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/2 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/3
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/3 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/4
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/4 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/5
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/5 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/6
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/6 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/7
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/7 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/8
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/8 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/9
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/9 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/10
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/10 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/11
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/11 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/12
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/12 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/13
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/13 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/14
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/14 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/15
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/15 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/16
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/16 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/17
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/17 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/18
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/18 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/19
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/19 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/20
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/20 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/21
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/21 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/22
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/22 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/23
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/23 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/24
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/24 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/25
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/25 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/26
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/26 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/27
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/27 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/28
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/28 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/29
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/29 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/30
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/30 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/31
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/31 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/32
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/32 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/33
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/33 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/34
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/34 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/35
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/35 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/36
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/36 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/37
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/37 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/38
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/38 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/39
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/39 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/40
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/40 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/41
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/41 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/42
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/42 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/43
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/43 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/44
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/44 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/45
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/45 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/46
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/46 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/47
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/47 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/48
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/48 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/49
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/49 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/50
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/50 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/51
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/51 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/52
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/52 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/53
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/53 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/54
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/54 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/55
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/55 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/56
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/56 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/57
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/57 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/58
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/58 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/59
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/59 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/60
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/60 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/61
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/61 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/62
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/62 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/63
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/63 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/64
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/64 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/65
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/65 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/66
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/66 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/67
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/67 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/68
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/68 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/69
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/69 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/70
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/70 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/71
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/71 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/72
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/72 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/73
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/73 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/74
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/74 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/75
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/75 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/76
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/76 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/77
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/77 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/78
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/78 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/79
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/79 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/80
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/80 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/81
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/81 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/82
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/82 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/83
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/83 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/84
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/84 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/85
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/85 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/86
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/86 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/87
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/87 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/88
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/88 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/89
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/89 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/90
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/90 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/91
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/91 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/92
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/92 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/93
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/93 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/94
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/94 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/95
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/95 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/96
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/96 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/97
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/97 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/98
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/98 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/99
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/99 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/100
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/100 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/101
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/101 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/102
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/102 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/103
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/103 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/104
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/104 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/105
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/105 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/106
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/106 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/107
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/107 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/108
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/108 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/109
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/109 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/110
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/110 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/111
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/111 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/112
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/112 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/113
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/113 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/114
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/114 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/115
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/115 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/116
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/116 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/117
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/117 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/118
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/118 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/119
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/119 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/120
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/120 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/121
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/121 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/122
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/122 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/123
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/123 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/124
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/124 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/125
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/125 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/126
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/126 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/127
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/127 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/128
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/128 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/129
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/129 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/130
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/130 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/131
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/131 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/132
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/132 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/133
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/133 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/134
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/134 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/135
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/135 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/136
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/136 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/137
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/137 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/138
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/138 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/139
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/139 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/140
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/140 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/141
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/141 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/142
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/142 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/143
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/143 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/144
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/144 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/145
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/145 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/146
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/146 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/147
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/147 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/148
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/148 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/149
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/149 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/150
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/150 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/151
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/151 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/152
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/152 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/153
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/153 (1 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/154
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/154 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/155
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/155 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/156
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/156 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/157
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/157 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/158
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/158 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/159
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/159 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/160
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/160 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/161
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/161 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/162
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/162 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/163
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/163 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/164
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/164 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/165
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/165 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/166
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/166 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/167
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/167 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/168
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/168 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/169
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/169 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/170
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/170 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/171
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/171 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/172
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/172 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/173
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/173 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/174
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/174 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/175
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/175 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/176
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/176 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/177
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/177 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/178
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/178 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/179
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/179 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/180
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/180 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/181
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/181 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/182
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/182 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/183
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/183 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/184
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/184 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/185
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/185 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/186
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/186 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/187
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/187 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/188
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/188 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/189
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/189 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/190
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/190 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/191
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/191 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/192
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/192 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/193
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/193 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/194
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/194 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/195
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/195 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/196
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/196 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/197
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/197 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/198
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/198 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/199
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/199 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/200
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/200 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/201
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/201 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/202
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/202 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/203
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/203 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/204
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/204 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/205
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/205 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/206
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/206 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/207
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/207 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/208
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/208 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/209
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/209 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/210
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/210 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/211
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/211 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/212
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/212 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/213
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/213 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/214
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/214 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/215
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/215 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/216
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/216 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/217
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/217 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/218
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/218 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/219
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/219 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/220
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/220 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/221
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/221 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/222
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/222 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/223
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/223 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/224
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/224 (0 ms)
[ RUN      ] Ucs4TestCases/Ucs4Test.DestTooSmall/225
[       OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/225 (0 ms)
[----------] 678 tests from Ucs4TestCases/Ucs4Test (60 ms total)

[----------] 66 tests from Iso88591TestCases/Ucs2Test
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/0
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/0 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/1
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/1 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/2
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/2 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/3
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/3 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/4
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/4 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/5
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/5 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/6
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/6 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/7
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/7 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/8
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/8 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/9
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/9 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/10
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/10 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/11
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/11 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/12
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/12 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/13
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/13 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/14
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/14 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/15
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/15 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/16
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/16 (1 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/17
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/17 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/18
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/18 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/19
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/19 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/20
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/20 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.ToUtf8/21
[       OK ] Iso88591TestCases/Ucs2Test.ToUtf8/21 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/0
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/0 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/1
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/1 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/2
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/2 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/3
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/3 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/4
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/4 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/5
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/5 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/6
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/6 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/7
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/7 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/8
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/8 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/9
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/9 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/10
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/10 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/11
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/11 (1 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/12
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/12 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/13
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/13 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/14
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/14 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/15
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/15 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/16
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/16 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/17
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/17 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/18
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/18 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/19
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/19 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/20
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/20 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.FromUtf8/21
[       OK ] Iso88591TestCases/Ucs2Test.FromUtf8/21 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/0
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/0 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/1
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/1 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/2
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/2 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/3
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/3 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/4
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/4 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/5
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/5 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/6
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/6 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/7
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/7 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/8
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/8 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/9
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/9 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/10
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/10 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/11
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/11 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/12
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/12 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/13
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/13 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/14
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/14 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/15
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/15 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/16
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/16 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/17
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/17 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/18
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/18 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/19
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/19 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/20
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/20 (0 ms)
[ RUN      ] Iso88591TestCases/Ucs2Test.DestTooSmall/21
[       OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/21 (0 ms)
[----------] 66 tests from Iso88591TestCases/Ucs2Test (3 ms total)

[----------] 327 tests from Ucs2TestCases/Ucs2Test
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/0
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/0 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/1
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/1 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/2
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/2 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/3
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/3 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/4
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/4 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/5
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/5 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/6
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/6 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/7
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/7 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/8
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/8 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/9
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/9 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/10
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/10 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/11
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/11 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/12
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/12 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/13
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/13 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/14
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/14 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/15
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/15 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/16
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/16 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/17
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/17 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/18
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/18 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/19
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/19 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/20
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/20 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/21
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/21 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/22
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/22 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/23
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/23 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/24
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/24 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/25
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/25 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/26
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/26 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/27
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/27 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/28
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/28 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/29
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/29 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/30
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/30 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/31
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/31 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/32
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/32 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/33
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/33 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/34
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/34 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/35
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/35 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/36
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/36 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/37
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/37 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/38
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/38 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/39
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/39 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/40
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/40 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/41
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/41 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/42
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/42 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/43
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/43 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/44
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/44 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/45
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/45 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/46
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/46 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/47
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/47 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/48
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/48 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/49
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/49 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/50
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/50 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/51
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/51 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/52
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/52 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/53
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/53 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/54
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/54 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/55
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/55 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/56
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/56 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/57
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/57 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/58
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/58 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/59
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/59 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/60
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/60 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/61
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/61 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/62
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/62 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/63
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/63 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/64
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/64 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/65
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/65 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/66
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/66 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/67
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/67 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/68
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/68 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/69
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/69 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/70
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/70 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/71
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/71 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/72
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/72 (1 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/73
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/73 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/74
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/74 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/75
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/75 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/76
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/76 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/77
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/77 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/78
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/78 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/79
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/79 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/80
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/80 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/81
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/81 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/82
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/82 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/83
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/83 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/84
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/84 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/85
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/85 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/86
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/86 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/87
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/87 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/88
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/88 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/89
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/89 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/90
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/90 (1 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/91
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/91 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/92
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/92 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/93
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/93 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/94
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/94 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/95
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/95 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/96
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/96 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/97
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/97 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/98
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/98 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/99
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/99 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/100
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/100 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/101
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/101 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/102
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/102 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/103
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/103 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/104
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/104 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/105
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/105 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/106
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/106 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/107
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/107 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.ToUtf8/108
[       OK ] Ucs2TestCases/Ucs2Test.ToUtf8/108 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/0
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/0 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/1
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/1 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/2
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/2 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/3
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/3 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/4
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/4 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/5
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/5 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/6
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/6 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/7
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/7 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/8
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/8 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/9
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/9 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/10
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/10 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/11
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/11 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/12
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/12 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/13
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/13 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/14
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/14 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/15
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/15 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/16
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/16 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/17
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/17 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/18
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/18 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/19
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/19 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/20
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/20 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/21
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/21 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/22
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/22 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/23
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/23 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/24
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/24 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/25
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/25 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/26
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/26 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/27
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/27 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/28
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/28 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/29
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/29 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/30
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/30 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/31
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/31 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/32
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/32 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/33
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/33 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/34
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/34 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/35
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/35 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/36
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/36 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/37
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/37 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/38
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/38 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/39
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/39 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/40
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/40 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/41
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/41 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/42
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/42 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/43
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/43 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/44
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/44 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/45
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/45 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/46
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/46 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/47
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/47 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/48
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/48 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/49
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/49 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/50
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/50 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/51
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/51 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/52
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/52 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/53
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/53 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/54
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/54 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/55
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/55 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/56
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/56 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/57
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/57 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/58
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/58 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/59
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/59 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/60
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/60 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/61
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/61 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/62
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/62 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/63
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/63 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/64
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/64 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/65
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/65 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/66
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/66 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/67
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/67 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/68
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/68 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/69
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/69 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/70
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/70 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/71
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/71 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/72
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/72 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/73
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/73 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/74
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/74 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/75
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/75 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/76
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/76 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/77
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/77 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/78
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/78 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/79
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/79 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/80
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/80 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/81
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/81 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/82
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/82 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/83
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/83 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/84
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/84 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/85
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/85 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/86
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/86 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/87
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/87 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/88
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/88 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/89
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/89 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/90
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/90 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/91
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/91 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/92
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/92 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/93
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/93 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/94
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/94 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/95
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/95 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/96
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/96 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/97
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/97 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/98
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/98 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/99
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/99 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/100
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/100 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/101
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/101 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/102
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/102 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/103
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/103 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/104
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/104 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/105
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/105 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/106
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/106 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/107
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/107 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.FromUtf8/108
[       OK ] Ucs2TestCases/Ucs2Test.FromUtf8/108 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/0
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/0 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/1
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/1 (1 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/2
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/2 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/3
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/3 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/4
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/4 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/5
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/5 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/6
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/6 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/7
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/7 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/8
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/8 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/9
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/9 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/10
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/10 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/11
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/11 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/12
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/12 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/13
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/13 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/14
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/14 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/15
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/15 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/16
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/16 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/17
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/17 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/18
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/18 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/19
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/19 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/20
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/20 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/21
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/21 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/22
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/22 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/23
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/23 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/24
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/24 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/25
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/25 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/26
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/26 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/27
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/27 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/28
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/28 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/29
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/29 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/30
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/30 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/31
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/31 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/32
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/32 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/33
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/33 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/34
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/34 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/35
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/35 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/36
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/36 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/37
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/37 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/38
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/38 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/39
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/39 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/40
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/40 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/41
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/41 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/42
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/42 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/43
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/43 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/44
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/44 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/45
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/45 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/46
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/46 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/47
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/47 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/48
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/48 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/49
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/49 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/50
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/50 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/51
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/51 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/52
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/52 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/53
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/53 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/54
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/54 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/55
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/55 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/56
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/56 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/57
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/57 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/58
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/58 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/59
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/59 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/60
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/60 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/61
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/61 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/62
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/62 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/63
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/63 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/64
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/64 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/65
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/65 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/66
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/66 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/67
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/67 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/68
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/68 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/69
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/69 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/70
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/70 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/71
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/71 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/72
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/72 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/73
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/73 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/74
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/74 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/75
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/75 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/76
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/76 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/77
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/77 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/78
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/78 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/79
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/79 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/80
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/80 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/81
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/81 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/82
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/82 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/83
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/83 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/84
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/84 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/85
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/85 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/86
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/86 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/87
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/87 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/88
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/88 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/89
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/89 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/90
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/90 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/91
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/91 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/92
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/92 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/93
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/93 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/94
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/94 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/95
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/95 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/96
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/96 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/97
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/97 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/98
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/98 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/99
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/99 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/100
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/100 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/101
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/101 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/102
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/102 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/103
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/103 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/104
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/104 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/105
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/105 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/106
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/106 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/107
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/107 (0 ms)
[ RUN      ] Ucs2TestCases/Ucs2Test.DestTooSmall/108
[       OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/108 (0 ms)
[----------] 327 tests from Ucs2TestCases/Ucs2Test (23 ms total)

[----------] 738 tests from Utf16TestCases/Utf16Test
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/0
[       OK ] Utf16TestCases/Utf16Test.From16To32/0 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/1
[       OK ] Utf16TestCases/Utf16Test.From16To32/1 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/2
[       OK ] Utf16TestCases/Utf16Test.From16To32/2 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/3
[       OK ] Utf16TestCases/Utf16Test.From16To32/3 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/4
[       OK ] Utf16TestCases/Utf16Test.From16To32/4 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/5
[       OK ] Utf16TestCases/Utf16Test.From16To32/5 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/6
[       OK ] Utf16TestCases/Utf16Test.From16To32/6 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/7
[       OK ] Utf16TestCases/Utf16Test.From16To32/7 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/8
[       OK ] Utf16TestCases/Utf16Test.From16To32/8 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/9
[       OK ] Utf16TestCases/Utf16Test.From16To32/9 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/10
[       OK ] Utf16TestCases/Utf16Test.From16To32/10 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/11
[       OK ] Utf16TestCases/Utf16Test.From16To32/11 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/12
[       OK ] Utf16TestCases/Utf16Test.From16To32/12 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/13
[       OK ] Utf16TestCases/Utf16Test.From16To32/13 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/14
[       OK ] Utf16TestCases/Utf16Test.From16To32/14 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/15
[       OK ] Utf16TestCases/Utf16Test.From16To32/15 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/16
[       OK ] Utf16TestCases/Utf16Test.From16To32/16 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/17
[       OK ] Utf16TestCases/Utf16Test.From16To32/17 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/18
[       OK ] Utf16TestCases/Utf16Test.From16To32/18 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/19
[       OK ] Utf16TestCases/Utf16Test.From16To32/19 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/20
[       OK ] Utf16TestCases/Utf16Test.From16To32/20 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/21
[       OK ] Utf16TestCases/Utf16Test.From16To32/21 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/22
[       OK ] Utf16TestCases/Utf16Test.From16To32/22 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/23
[       OK ] Utf16TestCases/Utf16Test.From16To32/23 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/24
[       OK ] Utf16TestCases/Utf16Test.From16To32/24 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/25
[       OK ] Utf16TestCases/Utf16Test.From16To32/25 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/26
[       OK ] Utf16TestCases/Utf16Test.From16To32/26 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/27
[       OK ] Utf16TestCases/Utf16Test.From16To32/27 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/28
[       OK ] Utf16TestCases/Utf16Test.From16To32/28 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/29
[       OK ] Utf16TestCases/Utf16Test.From16To32/29 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/30
[       OK ] Utf16TestCases/Utf16Test.From16To32/30 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/31
[       OK ] Utf16TestCases/Utf16Test.From16To32/31 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/32
[       OK ] Utf16TestCases/Utf16Test.From16To32/32 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/33
[       OK ] Utf16TestCases/Utf16Test.From16To32/33 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/34
[       OK ] Utf16TestCases/Utf16Test.From16To32/34 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/35
[       OK ] Utf16TestCases/Utf16Test.From16To32/35 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/36
[       OK ] Utf16TestCases/Utf16Test.From16To32/36 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/37
[       OK ] Utf16TestCases/Utf16Test.From16To32/37 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/38
[       OK ] Utf16TestCases/Utf16Test.From16To32/38 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/39
[       OK ] Utf16TestCases/Utf16Test.From16To32/39 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/40
[       OK ] Utf16TestCases/Utf16Test.From16To32/40 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/41
[       OK ] Utf16TestCases/Utf16Test.From16To32/41 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/42
[       OK ] Utf16TestCases/Utf16Test.From16To32/42 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/43
[       OK ] Utf16TestCases/Utf16Test.From16To32/43 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/44
[       OK ] Utf16TestCases/Utf16Test.From16To32/44 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/45
[       OK ] Utf16TestCases/Utf16Test.From16To32/45 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/46
[       OK ] Utf16TestCases/Utf16Test.From16To32/46 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/47
[       OK ] Utf16TestCases/Utf16Test.From16To32/47 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/48
[       OK ] Utf16TestCases/Utf16Test.From16To32/48 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/49
[       OK ] Utf16TestCases/Utf16Test.From16To32/49 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/50
[       OK ] Utf16TestCases/Utf16Test.From16To32/50 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/51
[       OK ] Utf16TestCases/Utf16Test.From16To32/51 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/52
[       OK ] Utf16TestCases/Utf16Test.From16To32/52 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/53
[       OK ] Utf16TestCases/Utf16Test.From16To32/53 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/54
[       OK ] Utf16TestCases/Utf16Test.From16To32/54 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/55
[       OK ] Utf16TestCases/Utf16Test.From16To32/55 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/56
[       OK ] Utf16TestCases/Utf16Test.From16To32/56 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/57
[       OK ] Utf16TestCases/Utf16Test.From16To32/57 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/58
[       OK ] Utf16TestCases/Utf16Test.From16To32/58 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/59
[       OK ] Utf16TestCases/Utf16Test.From16To32/59 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/60
[       OK ] Utf16TestCases/Utf16Test.From16To32/60 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/61
[       OK ] Utf16TestCases/Utf16Test.From16To32/61 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/62
[       OK ] Utf16TestCases/Utf16Test.From16To32/62 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/63
[       OK ] Utf16TestCases/Utf16Test.From16To32/63 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/64
[       OK ] Utf16TestCases/Utf16Test.From16To32/64 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/65
[       OK ] Utf16TestCases/Utf16Test.From16To32/65 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/66
[       OK ] Utf16TestCases/Utf16Test.From16To32/66 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/67
[       OK ] Utf16TestCases/Utf16Test.From16To32/67 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/68
[       OK ] Utf16TestCases/Utf16Test.From16To32/68 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/69
[       OK ] Utf16TestCases/Utf16Test.From16To32/69 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/70
[       OK ] Utf16TestCases/Utf16Test.From16To32/70 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/71
[       OK ] Utf16TestCases/Utf16Test.From16To32/71 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/72
[       OK ] Utf16TestCases/Utf16Test.From16To32/72 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/73
[       OK ] Utf16TestCases/Utf16Test.From16To32/73 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/74
[       OK ] Utf16TestCases/Utf16Test.From16To32/74 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/75
[       OK ] Utf16TestCases/Utf16Test.From16To32/75 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/76
[       OK ] Utf16TestCases/Utf16Test.From16To32/76 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/77
[       OK ] Utf16TestCases/Utf16Test.From16To32/77 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/78
[       OK ] Utf16TestCases/Utf16Test.From16To32/78 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/79
[       OK ] Utf16TestCases/Utf16Test.From16To32/79 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/80
[       OK ] Utf16TestCases/Utf16Test.From16To32/80 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/81
[       OK ] Utf16TestCases/Utf16Test.From16To32/81 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/82
[       OK ] Utf16TestCases/Utf16Test.From16To32/82 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/83
[       OK ] Utf16TestCases/Utf16Test.From16To32/83 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/84
[       OK ] Utf16TestCases/Utf16Test.From16To32/84 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/85
[       OK ] Utf16TestCases/Utf16Test.From16To32/85 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/86
[       OK ] Utf16TestCases/Utf16Test.From16To32/86 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/87
[       OK ] Utf16TestCases/Utf16Test.From16To32/87 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/88
[       OK ] Utf16TestCases/Utf16Test.From16To32/88 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/89
[       OK ] Utf16TestCases/Utf16Test.From16To32/89 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/90
[       OK ] Utf16TestCases/Utf16Test.From16To32/90 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/91
[       OK ] Utf16TestCases/Utf16Test.From16To32/91 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/92
[       OK ] Utf16TestCases/Utf16Test.From16To32/92 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/93
[       OK ] Utf16TestCases/Utf16Test.From16To32/93 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/94
[       OK ] Utf16TestCases/Utf16Test.From16To32/94 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/95
[       OK ] Utf16TestCases/Utf16Test.From16To32/95 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/96
[       OK ] Utf16TestCases/Utf16Test.From16To32/96 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/97
[       OK ] Utf16TestCases/Utf16Test.From16To32/97 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/98
[       OK ] Utf16TestCases/Utf16Test.From16To32/98 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/99
[       OK ] Utf16TestCases/Utf16Test.From16To32/99 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/100
[       OK ] Utf16TestCases/Utf16Test.From16To32/100 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/101
[       OK ] Utf16TestCases/Utf16Test.From16To32/101 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/102
[       OK ] Utf16TestCases/Utf16Test.From16To32/102 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/103
[       OK ] Utf16TestCases/Utf16Test.From16To32/103 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/104
[       OK ] Utf16TestCases/Utf16Test.From16To32/104 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/105
[       OK ] Utf16TestCases/Utf16Test.From16To32/105 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/106
[       OK ] Utf16TestCases/Utf16Test.From16To32/106 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/107
[       OK ] Utf16TestCases/Utf16Test.From16To32/107 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/108
[       OK ] Utf16TestCases/Utf16Test.From16To32/108 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/109
[       OK ] Utf16TestCases/Utf16Test.From16To32/109 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/110
[       OK ] Utf16TestCases/Utf16Test.From16To32/110 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/111
[       OK ] Utf16TestCases/Utf16Test.From16To32/111 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/112
[       OK ] Utf16TestCases/Utf16Test.From16To32/112 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/113
[       OK ] Utf16TestCases/Utf16Test.From16To32/113 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/114
[       OK ] Utf16TestCases/Utf16Test.From16To32/114 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/115
[       OK ] Utf16TestCases/Utf16Test.From16To32/115 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/116
[       OK ] Utf16TestCases/Utf16Test.From16To32/116 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/117
[       OK ] Utf16TestCases/Utf16Test.From16To32/117 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/118
[       OK ] Utf16TestCases/Utf16Test.From16To32/118 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/119
[       OK ] Utf16TestCases/Utf16Test.From16To32/119 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/120
[       OK ] Utf16TestCases/Utf16Test.From16To32/120 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/121
[       OK ] Utf16TestCases/Utf16Test.From16To32/121 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/122
[       OK ] Utf16TestCases/Utf16Test.From16To32/122 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/123
[       OK ] Utf16TestCases/Utf16Test.From16To32/123 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/124
[       OK ] Utf16TestCases/Utf16Test.From16To32/124 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/125
[       OK ] Utf16TestCases/Utf16Test.From16To32/125 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/126
[       OK ] Utf16TestCases/Utf16Test.From16To32/126 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/127
[       OK ] Utf16TestCases/Utf16Test.From16To32/127 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/128
[       OK ] Utf16TestCases/Utf16Test.From16To32/128 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/129
[       OK ] Utf16TestCases/Utf16Test.From16To32/129 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/130
[       OK ] Utf16TestCases/Utf16Test.From16To32/130 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/131
[       OK ] Utf16TestCases/Utf16Test.From16To32/131 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/132
[       OK ] Utf16TestCases/Utf16Test.From16To32/132 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/133
[       OK ] Utf16TestCases/Utf16Test.From16To32/133 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/134
[       OK ] Utf16TestCases/Utf16Test.From16To32/134 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/135
[       OK ] Utf16TestCases/Utf16Test.From16To32/135 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/136
[       OK ] Utf16TestCases/Utf16Test.From16To32/136 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/137
[       OK ] Utf16TestCases/Utf16Test.From16To32/137 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/138
[       OK ] Utf16TestCases/Utf16Test.From16To32/138 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/139
[       OK ] Utf16TestCases/Utf16Test.From16To32/139 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/140
[       OK ] Utf16TestCases/Utf16Test.From16To32/140 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/141
[       OK ] Utf16TestCases/Utf16Test.From16To32/141 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/142
[       OK ] Utf16TestCases/Utf16Test.From16To32/142 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/143
[       OK ] Utf16TestCases/Utf16Test.From16To32/143 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/144
[       OK ] Utf16TestCases/Utf16Test.From16To32/144 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/145
[       OK ] Utf16TestCases/Utf16Test.From16To32/145 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/146
[       OK ] Utf16TestCases/Utf16Test.From16To32/146 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/147
[       OK ] Utf16TestCases/Utf16Test.From16To32/147 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/148
[       OK ] Utf16TestCases/Utf16Test.From16To32/148 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/149
[       OK ] Utf16TestCases/Utf16Test.From16To32/149 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/150
[       OK ] Utf16TestCases/Utf16Test.From16To32/150 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/151
[       OK ] Utf16TestCases/Utf16Test.From16To32/151 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/152
[       OK ] Utf16TestCases/Utf16Test.From16To32/152 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/153
[       OK ] Utf16TestCases/Utf16Test.From16To32/153 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/154
[       OK ] Utf16TestCases/Utf16Test.From16To32/154 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/155
[       OK ] Utf16TestCases/Utf16Test.From16To32/155 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/156
[       OK ] Utf16TestCases/Utf16Test.From16To32/156 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/157
[       OK ] Utf16TestCases/Utf16Test.From16To32/157 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/158
[       OK ] Utf16TestCases/Utf16Test.From16To32/158 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/159
[       OK ] Utf16TestCases/Utf16Test.From16To32/159 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/160
[       OK ] Utf16TestCases/Utf16Test.From16To32/160 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/161
[       OK ] Utf16TestCases/Utf16Test.From16To32/161 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/162
[       OK ] Utf16TestCases/Utf16Test.From16To32/162 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/163
[       OK ] Utf16TestCases/Utf16Test.From16To32/163 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/164
[       OK ] Utf16TestCases/Utf16Test.From16To32/164 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/165
[       OK ] Utf16TestCases/Utf16Test.From16To32/165 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/166
[       OK ] Utf16TestCases/Utf16Test.From16To32/166 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/167
[       OK ] Utf16TestCases/Utf16Test.From16To32/167 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/168
[       OK ] Utf16TestCases/Utf16Test.From16To32/168 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/169
[       OK ] Utf16TestCases/Utf16Test.From16To32/169 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/170
[       OK ] Utf16TestCases/Utf16Test.From16To32/170 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/171
[       OK ] Utf16TestCases/Utf16Test.From16To32/171 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/172
[       OK ] Utf16TestCases/Utf16Test.From16To32/172 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/173
[       OK ] Utf16TestCases/Utf16Test.From16To32/173 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/174
[       OK ] Utf16TestCases/Utf16Test.From16To32/174 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/175
[       OK ] Utf16TestCases/Utf16Test.From16To32/175 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/176
[       OK ] Utf16TestCases/Utf16Test.From16To32/176 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/177
[       OK ] Utf16TestCases/Utf16Test.From16To32/177 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/178
[       OK ] Utf16TestCases/Utf16Test.From16To32/178 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/179
[       OK ] Utf16TestCases/Utf16Test.From16To32/179 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/180
[       OK ] Utf16TestCases/Utf16Test.From16To32/180 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/181
[       OK ] Utf16TestCases/Utf16Test.From16To32/181 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/182
[       OK ] Utf16TestCases/Utf16Test.From16To32/182 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/183
[       OK ] Utf16TestCases/Utf16Test.From16To32/183 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/184
[       OK ] Utf16TestCases/Utf16Test.From16To32/184 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/185
[       OK ] Utf16TestCases/Utf16Test.From16To32/185 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/186
[       OK ] Utf16TestCases/Utf16Test.From16To32/186 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/187
[       OK ] Utf16TestCases/Utf16Test.From16To32/187 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/188
[       OK ] Utf16TestCases/Utf16Test.From16To32/188 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/189
[       OK ] Utf16TestCases/Utf16Test.From16To32/189 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/190
[       OK ] Utf16TestCases/Utf16Test.From16To32/190 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/191
[       OK ] Utf16TestCases/Utf16Test.From16To32/191 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/192
[       OK ] Utf16TestCases/Utf16Test.From16To32/192 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/193
[       OK ] Utf16TestCases/Utf16Test.From16To32/193 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/194
[       OK ] Utf16TestCases/Utf16Test.From16To32/194 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/195
[       OK ] Utf16TestCases/Utf16Test.From16To32/195 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/196
[       OK ] Utf16TestCases/Utf16Test.From16To32/196 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/197
[       OK ] Utf16TestCases/Utf16Test.From16To32/197 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/198
[       OK ] Utf16TestCases/Utf16Test.From16To32/198 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/199
[       OK ] Utf16TestCases/Utf16Test.From16To32/199 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/200
[       OK ] Utf16TestCases/Utf16Test.From16To32/200 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/201
[       OK ] Utf16TestCases/Utf16Test.From16To32/201 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/202
[       OK ] Utf16TestCases/Utf16Test.From16To32/202 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/203
[       OK ] Utf16TestCases/Utf16Test.From16To32/203 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/204
[       OK ] Utf16TestCases/Utf16Test.From16To32/204 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/205
[       OK ] Utf16TestCases/Utf16Test.From16To32/205 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/206
[       OK ] Utf16TestCases/Utf16Test.From16To32/206 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/207
[       OK ] Utf16TestCases/Utf16Test.From16To32/207 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/208
[       OK ] Utf16TestCases/Utf16Test.From16To32/208 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/209
[       OK ] Utf16TestCases/Utf16Test.From16To32/209 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/210
[       OK ] Utf16TestCases/Utf16Test.From16To32/210 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/211
[       OK ] Utf16TestCases/Utf16Test.From16To32/211 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/212
[       OK ] Utf16TestCases/Utf16Test.From16To32/212 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/213
[       OK ] Utf16TestCases/Utf16Test.From16To32/213 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/214
[       OK ] Utf16TestCases/Utf16Test.From16To32/214 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/215
[       OK ] Utf16TestCases/Utf16Test.From16To32/215 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/216
[       OK ] Utf16TestCases/Utf16Test.From16To32/216 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/217
[       OK ] Utf16TestCases/Utf16Test.From16To32/217 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/218
[       OK ] Utf16TestCases/Utf16Test.From16To32/218 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/219
[       OK ] Utf16TestCases/Utf16Test.From16To32/219 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/220
[       OK ] Utf16TestCases/Utf16Test.From16To32/220 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/221
[       OK ] Utf16TestCases/Utf16Test.From16To32/221 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/222
[       OK ] Utf16TestCases/Utf16Test.From16To32/222 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/223
[       OK ] Utf16TestCases/Utf16Test.From16To32/223 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/224
[       OK ] Utf16TestCases/Utf16Test.From16To32/224 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/225
[       OK ] Utf16TestCases/Utf16Test.From16To32/225 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/226
[       OK ] Utf16TestCases/Utf16Test.From16To32/226 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/227
[       OK ] Utf16TestCases/Utf16Test.From16To32/227 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/228
[       OK ] Utf16TestCases/Utf16Test.From16To32/228 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/229
[       OK ] Utf16TestCases/Utf16Test.From16To32/229 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/230
[       OK ] Utf16TestCases/Utf16Test.From16To32/230 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/231
[       OK ] Utf16TestCases/Utf16Test.From16To32/231 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/232
[       OK ] Utf16TestCases/Utf16Test.From16To32/232 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/233
[       OK ] Utf16TestCases/Utf16Test.From16To32/233 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/234
[       OK ] Utf16TestCases/Utf16Test.From16To32/234 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/235
[       OK ] Utf16TestCases/Utf16Test.From16To32/235 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/236
[       OK ] Utf16TestCases/Utf16Test.From16To32/236 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/237
[       OK ] Utf16TestCases/Utf16Test.From16To32/237 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/238
[       OK ] Utf16TestCases/Utf16Test.From16To32/238 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/239
[       OK ] Utf16TestCases/Utf16Test.From16To32/239 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/240
[       OK ] Utf16TestCases/Utf16Test.From16To32/240 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/241
[       OK ] Utf16TestCases/Utf16Test.From16To32/241 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/242
[       OK ] Utf16TestCases/Utf16Test.From16To32/242 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/243
[       OK ] Utf16TestCases/Utf16Test.From16To32/243 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/244
[       OK ] Utf16TestCases/Utf16Test.From16To32/244 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From16To32/245
[       OK ] Utf16TestCases/Utf16Test.From16To32/245 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/0
[       OK ] Utf16TestCases/Utf16Test.From32To16/0 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/1
[       OK ] Utf16TestCases/Utf16Test.From32To16/1 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/2
[       OK ] Utf16TestCases/Utf16Test.From32To16/2 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/3
[       OK ] Utf16TestCases/Utf16Test.From32To16/3 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/4
[       OK ] Utf16TestCases/Utf16Test.From32To16/4 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/5
[       OK ] Utf16TestCases/Utf16Test.From32To16/5 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/6
[       OK ] Utf16TestCases/Utf16Test.From32To16/6 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/7
[       OK ] Utf16TestCases/Utf16Test.From32To16/7 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/8
[       OK ] Utf16TestCases/Utf16Test.From32To16/8 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/9
[       OK ] Utf16TestCases/Utf16Test.From32To16/9 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/10
[       OK ] Utf16TestCases/Utf16Test.From32To16/10 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/11
[       OK ] Utf16TestCases/Utf16Test.From32To16/11 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/12
[       OK ] Utf16TestCases/Utf16Test.From32To16/12 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/13
[       OK ] Utf16TestCases/Utf16Test.From32To16/13 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/14
[       OK ] Utf16TestCases/Utf16Test.From32To16/14 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/15
[       OK ] Utf16TestCases/Utf16Test.From32To16/15 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/16
[       OK ] Utf16TestCases/Utf16Test.From32To16/16 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/17
[       OK ] Utf16TestCases/Utf16Test.From32To16/17 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/18
[       OK ] Utf16TestCases/Utf16Test.From32To16/18 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/19
[       OK ] Utf16TestCases/Utf16Test.From32To16/19 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/20
[       OK ] Utf16TestCases/Utf16Test.From32To16/20 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/21
[       OK ] Utf16TestCases/Utf16Test.From32To16/21 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/22
[       OK ] Utf16TestCases/Utf16Test.From32To16/22 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/23
[       OK ] Utf16TestCases/Utf16Test.From32To16/23 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/24
[       OK ] Utf16TestCases/Utf16Test.From32To16/24 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/25
[       OK ] Utf16TestCases/Utf16Test.From32To16/25 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/26
[       OK ] Utf16TestCases/Utf16Test.From32To16/26 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/27
[       OK ] Utf16TestCases/Utf16Test.From32To16/27 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/28
[       OK ] Utf16TestCases/Utf16Test.From32To16/28 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/29
[       OK ] Utf16TestCases/Utf16Test.From32To16/29 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/30
[       OK ] Utf16TestCases/Utf16Test.From32To16/30 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/31
[       OK ] Utf16TestCases/Utf16Test.From32To16/31 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/32
[       OK ] Utf16TestCases/Utf16Test.From32To16/32 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/33
[       OK ] Utf16TestCases/Utf16Test.From32To16/33 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/34
[       OK ] Utf16TestCases/Utf16Test.From32To16/34 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/35
[       OK ] Utf16TestCases/Utf16Test.From32To16/35 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/36
[       OK ] Utf16TestCases/Utf16Test.From32To16/36 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/37
[       OK ] Utf16TestCases/Utf16Test.From32To16/37 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/38
[       OK ] Utf16TestCases/Utf16Test.From32To16/38 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/39
[       OK ] Utf16TestCases/Utf16Test.From32To16/39 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/40
[       OK ] Utf16TestCases/Utf16Test.From32To16/40 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/41
[       OK ] Utf16TestCases/Utf16Test.From32To16/41 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/42
[       OK ] Utf16TestCases/Utf16Test.From32To16/42 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/43
[       OK ] Utf16TestCases/Utf16Test.From32To16/43 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/44
[       OK ] Utf16TestCases/Utf16Test.From32To16/44 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/45
[       OK ] Utf16TestCases/Utf16Test.From32To16/45 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/46
[       OK ] Utf16TestCases/Utf16Test.From32To16/46 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/47
[       OK ] Utf16TestCases/Utf16Test.From32To16/47 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/48
[       OK ] Utf16TestCases/Utf16Test.From32To16/48 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/49
[       OK ] Utf16TestCases/Utf16Test.From32To16/49 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/50
[       OK ] Utf16TestCases/Utf16Test.From32To16/50 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/51
[       OK ] Utf16TestCases/Utf16Test.From32To16/51 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/52
[       OK ] Utf16TestCases/Utf16Test.From32To16/52 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/53
[       OK ] Utf16TestCases/Utf16Test.From32To16/53 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/54
[       OK ] Utf16TestCases/Utf16Test.From32To16/54 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/55
[       OK ] Utf16TestCases/Utf16Test.From32To16/55 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/56
[       OK ] Utf16TestCases/Utf16Test.From32To16/56 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/57
[       OK ] Utf16TestCases/Utf16Test.From32To16/57 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/58
[       OK ] Utf16TestCases/Utf16Test.From32To16/58 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/59
[       OK ] Utf16TestCases/Utf16Test.From32To16/59 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/60
[       OK ] Utf16TestCases/Utf16Test.From32To16/60 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/61
[       OK ] Utf16TestCases/Utf16Test.From32To16/61 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/62
[       OK ] Utf16TestCases/Utf16Test.From32To16/62 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/63
[       OK ] Utf16TestCases/Utf16Test.From32To16/63 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/64
[       OK ] Utf16TestCases/Utf16Test.From32To16/64 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/65
[       OK ] Utf16TestCases/Utf16Test.From32To16/65 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/66
[       OK ] Utf16TestCases/Utf16Test.From32To16/66 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/67
[       OK ] Utf16TestCases/Utf16Test.From32To16/67 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/68
[       OK ] Utf16TestCases/Utf16Test.From32To16/68 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/69
[       OK ] Utf16TestCases/Utf16Test.From32To16/69 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/70
[       OK ] Utf16TestCases/Utf16Test.From32To16/70 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/71
[       OK ] Utf16TestCases/Utf16Test.From32To16/71 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/72
[       OK ] Utf16TestCases/Utf16Test.From32To16/72 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/73
[       OK ] Utf16TestCases/Utf16Test.From32To16/73 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/74
[       OK ] Utf16TestCases/Utf16Test.From32To16/74 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/75
[       OK ] Utf16TestCases/Utf16Test.From32To16/75 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/76
[       OK ] Utf16TestCases/Utf16Test.From32To16/76 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/77
[       OK ] Utf16TestCases/Utf16Test.From32To16/77 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/78
[       OK ] Utf16TestCases/Utf16Test.From32To16/78 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/79
[       OK ] Utf16TestCases/Utf16Test.From32To16/79 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/80
[       OK ] Utf16TestCases/Utf16Test.From32To16/80 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/81
[       OK ] Utf16TestCases/Utf16Test.From32To16/81 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/82
[       OK ] Utf16TestCases/Utf16Test.From32To16/82 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/83
[       OK ] Utf16TestCases/Utf16Test.From32To16/83 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/84
[       OK ] Utf16TestCases/Utf16Test.From32To16/84 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/85
[       OK ] Utf16TestCases/Utf16Test.From32To16/85 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/86
[       OK ] Utf16TestCases/Utf16Test.From32To16/86 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/87
[       OK ] Utf16TestCases/Utf16Test.From32To16/87 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/88
[       OK ] Utf16TestCases/Utf16Test.From32To16/88 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/89
[       OK ] Utf16TestCases/Utf16Test.From32To16/89 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/90
[       OK ] Utf16TestCases/Utf16Test.From32To16/90 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/91
[       OK ] Utf16TestCases/Utf16Test.From32To16/91 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/92
[       OK ] Utf16TestCases/Utf16Test.From32To16/92 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/93
[       OK ] Utf16TestCases/Utf16Test.From32To16/93 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/94
[       OK ] Utf16TestCases/Utf16Test.From32To16/94 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/95
[       OK ] Utf16TestCases/Utf16Test.From32To16/95 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/96
[       OK ] Utf16TestCases/Utf16Test.From32To16/96 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/97
[       OK ] Utf16TestCases/Utf16Test.From32To16/97 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/98
[       OK ] Utf16TestCases/Utf16Test.From32To16/98 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/99
[       OK ] Utf16TestCases/Utf16Test.From32To16/99 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/100
[       OK ] Utf16TestCases/Utf16Test.From32To16/100 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/101
[       OK ] Utf16TestCases/Utf16Test.From32To16/101 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/102
[       OK ] Utf16TestCases/Utf16Test.From32To16/102 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/103
[       OK ] Utf16TestCases/Utf16Test.From32To16/103 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/104
[       OK ] Utf16TestCases/Utf16Test.From32To16/104 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/105
[       OK ] Utf16TestCases/Utf16Test.From32To16/105 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/106
[       OK ] Utf16TestCases/Utf16Test.From32To16/106 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/107
[       OK ] Utf16TestCases/Utf16Test.From32To16/107 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/108
[       OK ] Utf16TestCases/Utf16Test.From32To16/108 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/109
[       OK ] Utf16TestCases/Utf16Test.From32To16/109 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/110
[       OK ] Utf16TestCases/Utf16Test.From32To16/110 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/111
[       OK ] Utf16TestCases/Utf16Test.From32To16/111 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/112
[       OK ] Utf16TestCases/Utf16Test.From32To16/112 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/113
[       OK ] Utf16TestCases/Utf16Test.From32To16/113 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/114
[       OK ] Utf16TestCases/Utf16Test.From32To16/114 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/115
[       OK ] Utf16TestCases/Utf16Test.From32To16/115 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/116
[       OK ] Utf16TestCases/Utf16Test.From32To16/116 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/117
[       OK ] Utf16TestCases/Utf16Test.From32To16/117 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/118
[       OK ] Utf16TestCases/Utf16Test.From32To16/118 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/119
[       OK ] Utf16TestCases/Utf16Test.From32To16/119 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/120
[       OK ] Utf16TestCases/Utf16Test.From32To16/120 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/121
[       OK ] Utf16TestCases/Utf16Test.From32To16/121 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/122
[       OK ] Utf16TestCases/Utf16Test.From32To16/122 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/123
[       OK ] Utf16TestCases/Utf16Test.From32To16/123 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/124
[       OK ] Utf16TestCases/Utf16Test.From32To16/124 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/125
[       OK ] Utf16TestCases/Utf16Test.From32To16/125 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/126
[       OK ] Utf16TestCases/Utf16Test.From32To16/126 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/127
[       OK ] Utf16TestCases/Utf16Test.From32To16/127 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/128
[       OK ] Utf16TestCases/Utf16Test.From32To16/128 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/129
[       OK ] Utf16TestCases/Utf16Test.From32To16/129 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/130
[       OK ] Utf16TestCases/Utf16Test.From32To16/130 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/131
[       OK ] Utf16TestCases/Utf16Test.From32To16/131 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/132
[       OK ] Utf16TestCases/Utf16Test.From32To16/132 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/133
[       OK ] Utf16TestCases/Utf16Test.From32To16/133 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/134
[       OK ] Utf16TestCases/Utf16Test.From32To16/134 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/135
[       OK ] Utf16TestCases/Utf16Test.From32To16/135 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/136
[       OK ] Utf16TestCases/Utf16Test.From32To16/136 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/137
[       OK ] Utf16TestCases/Utf16Test.From32To16/137 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/138
[       OK ] Utf16TestCases/Utf16Test.From32To16/138 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/139
[       OK ] Utf16TestCases/Utf16Test.From32To16/139 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/140
[       OK ] Utf16TestCases/Utf16Test.From32To16/140 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/141
[       OK ] Utf16TestCases/Utf16Test.From32To16/141 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/142
[       OK ] Utf16TestCases/Utf16Test.From32To16/142 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/143
[       OK ] Utf16TestCases/Utf16Test.From32To16/143 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/144
[       OK ] Utf16TestCases/Utf16Test.From32To16/144 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/145
[       OK ] Utf16TestCases/Utf16Test.From32To16/145 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/146
[       OK ] Utf16TestCases/Utf16Test.From32To16/146 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/147
[       OK ] Utf16TestCases/Utf16Test.From32To16/147 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/148
[       OK ] Utf16TestCases/Utf16Test.From32To16/148 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/149
[       OK ] Utf16TestCases/Utf16Test.From32To16/149 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/150
[       OK ] Utf16TestCases/Utf16Test.From32To16/150 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/151
[       OK ] Utf16TestCases/Utf16Test.From32To16/151 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/152
[       OK ] Utf16TestCases/Utf16Test.From32To16/152 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/153
[       OK ] Utf16TestCases/Utf16Test.From32To16/153 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/154
[       OK ] Utf16TestCases/Utf16Test.From32To16/154 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/155
[       OK ] Utf16TestCases/Utf16Test.From32To16/155 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/156
[       OK ] Utf16TestCases/Utf16Test.From32To16/156 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/157
[       OK ] Utf16TestCases/Utf16Test.From32To16/157 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/158
[       OK ] Utf16TestCases/Utf16Test.From32To16/158 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/159
[       OK ] Utf16TestCases/Utf16Test.From32To16/159 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/160
[       OK ] Utf16TestCases/Utf16Test.From32To16/160 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/161
[       OK ] Utf16TestCases/Utf16Test.From32To16/161 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/162
[       OK ] Utf16TestCases/Utf16Test.From32To16/162 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/163
[       OK ] Utf16TestCases/Utf16Test.From32To16/163 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/164
[       OK ] Utf16TestCases/Utf16Test.From32To16/164 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/165
[       OK ] Utf16TestCases/Utf16Test.From32To16/165 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/166
[       OK ] Utf16TestCases/Utf16Test.From32To16/166 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/167
[       OK ] Utf16TestCases/Utf16Test.From32To16/167 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/168
[       OK ] Utf16TestCases/Utf16Test.From32To16/168 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/169
[       OK ] Utf16TestCases/Utf16Test.From32To16/169 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/170
[       OK ] Utf16TestCases/Utf16Test.From32To16/170 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/171
[       OK ] Utf16TestCases/Utf16Test.From32To16/171 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/172
[       OK ] Utf16TestCases/Utf16Test.From32To16/172 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/173
[       OK ] Utf16TestCases/Utf16Test.From32To16/173 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/174
[       OK ] Utf16TestCases/Utf16Test.From32To16/174 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/175
[       OK ] Utf16TestCases/Utf16Test.From32To16/175 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/176
[       OK ] Utf16TestCases/Utf16Test.From32To16/176 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/177
[       OK ] Utf16TestCases/Utf16Test.From32To16/177 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/178
[       OK ] Utf16TestCases/Utf16Test.From32To16/178 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/179
[       OK ] Utf16TestCases/Utf16Test.From32To16/179 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/180
[       OK ] Utf16TestCases/Utf16Test.From32To16/180 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/181
[       OK ] Utf16TestCases/Utf16Test.From32To16/181 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/182
[       OK ] Utf16TestCases/Utf16Test.From32To16/182 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/183
[       OK ] Utf16TestCases/Utf16Test.From32To16/183 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/184
[       OK ] Utf16TestCases/Utf16Test.From32To16/184 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/185
[       OK ] Utf16TestCases/Utf16Test.From32To16/185 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/186
[       OK ] Utf16TestCases/Utf16Test.From32To16/186 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/187
[       OK ] Utf16TestCases/Utf16Test.From32To16/187 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/188
[       OK ] Utf16TestCases/Utf16Test.From32To16/188 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/189
[       OK ] Utf16TestCases/Utf16Test.From32To16/189 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/190
[       OK ] Utf16TestCases/Utf16Test.From32To16/190 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/191
[       OK ] Utf16TestCases/Utf16Test.From32To16/191 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/192
[       OK ] Utf16TestCases/Utf16Test.From32To16/192 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/193
[       OK ] Utf16TestCases/Utf16Test.From32To16/193 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/194
[       OK ] Utf16TestCases/Utf16Test.From32To16/194 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/195
[       OK ] Utf16TestCases/Utf16Test.From32To16/195 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/196
[       OK ] Utf16TestCases/Utf16Test.From32To16/196 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/197
[       OK ] Utf16TestCases/Utf16Test.From32To16/197 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/198
[       OK ] Utf16TestCases/Utf16Test.From32To16/198 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/199
[       OK ] Utf16TestCases/Utf16Test.From32To16/199 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/200
[       OK ] Utf16TestCases/Utf16Test.From32To16/200 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/201
[       OK ] Utf16TestCases/Utf16Test.From32To16/201 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/202
[       OK ] Utf16TestCases/Utf16Test.From32To16/202 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/203
[       OK ] Utf16TestCases/Utf16Test.From32To16/203 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/204
[       OK ] Utf16TestCases/Utf16Test.From32To16/204 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/205
[       OK ] Utf16TestCases/Utf16Test.From32To16/205 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/206
[       OK ] Utf16TestCases/Utf16Test.From32To16/206 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/207
[       OK ] Utf16TestCases/Utf16Test.From32To16/207 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/208
[       OK ] Utf16TestCases/Utf16Test.From32To16/208 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/209
[       OK ] Utf16TestCases/Utf16Test.From32To16/209 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/210
[       OK ] Utf16TestCases/Utf16Test.From32To16/210 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/211
[       OK ] Utf16TestCases/Utf16Test.From32To16/211 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/212
[       OK ] Utf16TestCases/Utf16Test.From32To16/212 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/213
[       OK ] Utf16TestCases/Utf16Test.From32To16/213 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/214
[       OK ] Utf16TestCases/Utf16Test.From32To16/214 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/215
[       OK ] Utf16TestCases/Utf16Test.From32To16/215 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/216
[       OK ] Utf16TestCases/Utf16Test.From32To16/216 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/217
[       OK ] Utf16TestCases/Utf16Test.From32To16/217 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/218
[       OK ] Utf16TestCases/Utf16Test.From32To16/218 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/219
[       OK ] Utf16TestCases/Utf16Test.From32To16/219 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/220
[       OK ] Utf16TestCases/Utf16Test.From32To16/220 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/221
[       OK ] Utf16TestCases/Utf16Test.From32To16/221 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/222
[       OK ] Utf16TestCases/Utf16Test.From32To16/222 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/223
[       OK ] Utf16TestCases/Utf16Test.From32To16/223 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/224
[       OK ] Utf16TestCases/Utf16Test.From32To16/224 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/225
[       OK ] Utf16TestCases/Utf16Test.From32To16/225 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/226
[       OK ] Utf16TestCases/Utf16Test.From32To16/226 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/227
[       OK ] Utf16TestCases/Utf16Test.From32To16/227 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/228
[       OK ] Utf16TestCases/Utf16Test.From32To16/228 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/229
[       OK ] Utf16TestCases/Utf16Test.From32To16/229 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/230
[       OK ] Utf16TestCases/Utf16Test.From32To16/230 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/231
[       OK ] Utf16TestCases/Utf16Test.From32To16/231 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/232
[       OK ] Utf16TestCases/Utf16Test.From32To16/232 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/233
[       OK ] Utf16TestCases/Utf16Test.From32To16/233 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/234
[       OK ] Utf16TestCases/Utf16Test.From32To16/234 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/235
[       OK ] Utf16TestCases/Utf16Test.From32To16/235 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/236
[       OK ] Utf16TestCases/Utf16Test.From32To16/236 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/237
[       OK ] Utf16TestCases/Utf16Test.From32To16/237 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/238
[       OK ] Utf16TestCases/Utf16Test.From32To16/238 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/239
[       OK ] Utf16TestCases/Utf16Test.From32To16/239 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/240
[       OK ] Utf16TestCases/Utf16Test.From32To16/240 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/241
[       OK ] Utf16TestCases/Utf16Test.From32To16/241 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/242
[       OK ] Utf16TestCases/Utf16Test.From32To16/242 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/243
[       OK ] Utf16TestCases/Utf16Test.From32To16/243 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/244
[       OK ] Utf16TestCases/Utf16Test.From32To16/244 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.From32To16/245
[       OK ] Utf16TestCases/Utf16Test.From32To16/245 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/0
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/0 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/1
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/1 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/2
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/2 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/3
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/3 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/4
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/4 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/5
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/5 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/6
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/6 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/7
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/7 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/8
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/8 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/9
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/9 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/10
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/10 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/11
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/11 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/12
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/12 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/13
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/13 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/14
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/14 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/15
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/15 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/16
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/16 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/17
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/17 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/18
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/18 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/19
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/19 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/20
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/20 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/21
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/21 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/22
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/22 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/23
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/23 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/24
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/24 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/25
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/25 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/26
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/26 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/27
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/27 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/28
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/28 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/29
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/29 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/30
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/30 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/31
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/31 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/32
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/32 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/33
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/33 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/34
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/34 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/35
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/35 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/36
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/36 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/37
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/37 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/38
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/38 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/39
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/39 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/40
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/40 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/41
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/41 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/42
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/42 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/43
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/43 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/44
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/44 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/45
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/45 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/46
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/46 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/47
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/47 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/48
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/48 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/49
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/49 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/50
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/50 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/51
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/51 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/52
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/52 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/53
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/53 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/54
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/54 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/55
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/55 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/56
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/56 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/57
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/57 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/58
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/58 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/59
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/59 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/60
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/60 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/61
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/61 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/62
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/62 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/63
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/63 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/64
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/64 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/65
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/65 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/66
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/66 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/67
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/67 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/68
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/68 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/69
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/69 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/70
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/70 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/71
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/71 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/72
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/72 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/73
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/73 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/74
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/74 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/75
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/75 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/76
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/76 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/77
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/77 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/78
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/78 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/79
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/79 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/80
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/80 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/81
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/81 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/82
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/82 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/83
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/83 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/84
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/84 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/85
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/85 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/86
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/86 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/87
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/87 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/88
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/88 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/89
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/89 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/90
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/90 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/91
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/91 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/92
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/92 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/93
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/93 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/94
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/94 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/95
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/95 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/96
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/96 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/97
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/97 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/98
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/98 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/99
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/99 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/100
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/100 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/101
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/101 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/102
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/102 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/103
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/103 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/104
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/104 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/105
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/105 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/106
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/106 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/107
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/107 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/108
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/108 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/109
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/109 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/110
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/110 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/111
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/111 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/112
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/112 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/113
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/113 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/114
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/114 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/115
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/115 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/116
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/116 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/117
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/117 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/118
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/118 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/119
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/119 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/120
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/120 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/121
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/121 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/122
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/122 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/123
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/123 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/124
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/124 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/125
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/125 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/126
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/126 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/127
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/127 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/128
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/128 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/129
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/129 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/130
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/130 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/131
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/131 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/132
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/132 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/133
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/133 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/134
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/134 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/135
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/135 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/136
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/136 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/137
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/137 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/138
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/138 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/139
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/139 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/140
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/140 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/141
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/141 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/142
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/142 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/143
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/143 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/144
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/144 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/145
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/145 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/146
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/146 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/147
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/147 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/148
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/148 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/149
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/149 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/150
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/150 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/151
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/151 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/152
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/152 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/153
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/153 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/154
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/154 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/155
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/155 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/156
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/156 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/157
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/157 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/158
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/158 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/159
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/159 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/160
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/160 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/161
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/161 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/162
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/162 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/163
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/163 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/164
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/164 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/165
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/165 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/166
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/166 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/167
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/167 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/168
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/168 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/169
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/169 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/170
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/170 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/171
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/171 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/172
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/172 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/173
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/173 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/174
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/174 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/175
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/175 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/176
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/176 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/177
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/177 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/178
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/178 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/179
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/179 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/180
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/180 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/181
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/181 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/182
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/182 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/183
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/183 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/184
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/184 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/185
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/185 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/186
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/186 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/187
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/187 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/188
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/188 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/189
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/189 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/190
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/190 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/191
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/191 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/192
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/192 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/193
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/193 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/194
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/194 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/195
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/195 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/196
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/196 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/197
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/197 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/198
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/198 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/199
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/199 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/200
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/200 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/201
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/201 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/202
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/202 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/203
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/203 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/204
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/204 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/205
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/205 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/206
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/206 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/207
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/207 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/208
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/208 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/209
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/209 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/210
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/210 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/211
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/211 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/212
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/212 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/213
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/213 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/214
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/214 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/215
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/215 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/216
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/216 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/217
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/217 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/218
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/218 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/219
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/219 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/220
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/220 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/221
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/221 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/222
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/222 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/223
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/223 (1 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/224
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/224 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/225
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/225 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/226
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/226 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/227
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/227 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/228
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/228 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/229
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/229 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/230
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/230 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/231
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/231 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/232
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/232 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/233
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/233 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/234
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/234 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/235
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/235 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/236
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/236 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/237
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/237 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/238
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/238 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/239
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/239 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/240
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/240 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/241
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/241 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/242
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/242 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/243
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/243 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/244
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/244 (0 ms)
[ RUN      ] Utf16TestCases/Utf16Test.SameUtf8/245
[       OK ] Utf16TestCases/Utf16Test.SameUtf8/245 (0 ms)
[----------] 738 tests from Utf16TestCases/Utf16Test (42 ms total)

[----------] 78 tests from BadUtf8TestCases/BadUtf8Test
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/0
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/0 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/1
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/1 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/2
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/2 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/3
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/3 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/4
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/4 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/5
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/5 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/6
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/6 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/7
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/7 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/8
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/8 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/9
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/9 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/10
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/10 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/11
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/11 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/12
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/12 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/13
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/13 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/14
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/14 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/15
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/15 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/16
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/16 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/17
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/17 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/18
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/18 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/19
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/19 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/20
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/20 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/21
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/21 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/22
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/22 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/23
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/23 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/24
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/24 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/25
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/25 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/26
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/26 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/27
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/27 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/28
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/28 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/29
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/29 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/30
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/30 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/31
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/31 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/32
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/32 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/33
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/33 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/34
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/34 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/35
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/35 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/36
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/36 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/37
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/37 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/38
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/38 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/0
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/0 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/1
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/1 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/2
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/2 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/3
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/3 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/4
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/4 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/5
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/5 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/6
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/6 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/7
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/7 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/8
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/8 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/9
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/9 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/10
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/10 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/11
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/11 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/12
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/12 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/13
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/13 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/14
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/14 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/15
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/15 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/16
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/16 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/17
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/17 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/18
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/18 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/19
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/19 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/20
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/20 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/21
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/21 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/22
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/22 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/23
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/23 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/24
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/24 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/25
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/25 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/26
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/26 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/27
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/27 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/28
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/28 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/29
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/29 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/30
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/30 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/31
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/31 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/32
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/32 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/33
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/33 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/34
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/34 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/35
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/35 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/36
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/36 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/37
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/37 (0 ms)
[ RUN      ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/38
[       OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/38 (0 ms)
[----------] 78 tests from BadUtf8TestCases/BadUtf8Test (4 ms total)

[----------] 7 tests from BadUtf16TestCases/BadUtf16Test
[ RUN      ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/0
[       OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/0 (0 ms)
[ RUN      ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/1
[       OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/1 (0 ms)
[ RUN      ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/2
[       OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/2 (0 ms)
[ RUN      ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/3
[       OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/3 (0 ms)
[ RUN      ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/4
[       OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/4 (0 ms)
[ RUN      ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/5
[       OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/5 (0 ms)
[ RUN      ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/6
[       OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/6 (0 ms)
[----------] 7 tests from BadUtf16TestCases/BadUtf16Test (0 ms total)

[----------] 22 tests from Iso88591TestCases/Iso88591Test
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/0
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/0 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/1
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/1 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/2
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/2 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/3
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/3 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/4
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/4 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/5
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/5 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/6
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/6 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/7
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/7 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/8
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/8 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/9
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/9 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/10
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/10 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/11
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/11 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/12
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/12 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/13
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/13 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/14
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/14 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/15
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/15 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/16
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/16 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/17
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/17 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/18
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/18 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/19
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/19 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/20
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/20 (0 ms)
[ RUN      ] Iso88591TestCases/Iso88591Test.ToUtf8/21
[       OK ] Iso88591TestCases/Iso88591Test.ToUtf8/21 (0 ms)
[----------] 22 tests from Iso88591TestCases/Iso88591Test (2 ms total)

[----------] Global test environment tear-down
[==========] 1927 tests from 9 test cases ran. (5677 ms total)
[  PASSED  ] 1926 tests.
[  FAILED  ] 1 test, listed below:
[  FAILED  ] B64EncodeDecodeTest.LongFakeDecTest1

 1 FAILED TEST
test output dir: /<<PKGBUILDDIR>>/tests_results/security/testbuildd.1/util_gtest/report.xml
gtests.sh: #5349: util_gtest run successfully  - PASSED
TIMESTAMP gtests END: Fri May 19 19:52:11 UTC 2017
Running tests for ssl_gtests
TIMESTAMP ssl_gtests BEGIN: Fri May 19 19:52:11 UTC 2017
ssl_gtest.sh: SSL Gtests ===============================
ssl_gtest.sh: #7277: create ssl_gtest database  - PASSED


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
ssl_gtest.sh: #7278: create certificate: sign  - PASSED


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
ssl_gtest.sh: #7279: create certificate: sign kex - PASSED


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
ssl_gtest.sh: #7280: create certificate: sign  - PASSED


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
ssl_gtest.sh: #7281: create certificate: kex  - PASSED


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
ssl_gtest.sh: #7282: create certificate: sign  - PASSED


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
ssl_gtest.sh: #7283: create certificate: kex  - PASSED


Generating key.  This may take a few moments...

		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > 		0 - Digital Signature
		1 - Non-repudiation
		2 - Key encipherment
		3 - Data encipherment
		4 - Key agreement
		5 - Cert signing key
		6 - CRL signing key
		Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
ssl_gtest.sh: #7284: create certificate: sign  - PASSED
[==========] Running 1021 tests from 40 test cases.
[----------] Global test environment set-up.
[----------] 2 tests from SSLv2ClientHelloTestF
[ RUN      ] SSLv2ClientHelloTestF.FallbackSCSV
Version: TLS (no version)
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d03025039f50970af6d0d29556532672ec446201e222823...
client: Filtered packet: [33] 801f0103020006000000100000330056000a7b0e4cf4b671b31b73ee69f04985...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 1
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 1
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] SSLv2ClientHelloTestF.FallbackSCSV (160 ms)
[ RUN      ] SSLv2ClientHelloTestF.InappropriateFallbackSCSV
Version: TLS (no version)
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d03025e08dd75f0589ff9f597964a9b09b2d70ee18ff22f...
client: Filtered packet: [33] 801f0103020006000000100000330056000b94fa21bd2e6ad36b54f277c8f410...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 131: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 2
client: Readable
client: Handshake
client: Handshake failed with SSL error 131: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports.
client: Changing state from CONNECTING to ERROR
[       OK ] SSLv2ClientHelloTestF.InappropriateFallbackSCSV (34 ms)
[----------] 2 tests from SSLv2ClientHelloTestF (195 ms total)

[----------] 3 tests from TlsConnectTest
[ RUN      ] TlsConnectTest.TestDowngradeDetectionToTls11
Version: TLS (no version)
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [163] 030341cf6a7e7c5ebf62b93fbe257892580c557b24d2e33b41af444d8149b8a3...
handshake new: [163] 030241cf6a7e7c5ebf62b93fbe257892580c557b24d2e33b41af444d8149b8a3...
record old: [167] 010000a3030341cf6a7e7c5ebf62b93fbe257892580c557b24d2e33b41af444d...
record new: [167] 010000a3030241cf6a7e7c5ebf62b93fbe257892580c557b24d2e33b41af444d...
client: Original packet: [172] 16030100a7010000a3030341cf6a7e7c5ebf62b93fbe257892580c557b24d2e3...
client: Filtered packet: [172] 16030100a7010000a3030241cf6a7e7c5ebf62b93fbe257892580c557b24d2e3...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 3
client: Readable
client: Handshake
client: Handshake failed with SSL error 29: SSL received a malformed Server Hello handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] TlsConnectTest.TestDowngradeDetectionToTls11 (48 ms)
[ RUN      ] TlsConnectTest.TestDowngradeDetectionToTls10
Version: TLS (no version)
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [109] 030289c8e77f54d29983bb100f979b4428706279f39192d682a347dbd601fc76...
handshake new: [109] 030189c8e77f54d29983bb100f979b4428706279f39192d682a347dbd601fc76...
record old: [113] 0100006d030289c8e77f54d29983bb100f979b4428706279f39192d682a347db...
record new: [113] 0100006d030189c8e77f54d29983bb100f979b4428706279f39192d682a347db...
client: Original packet: [118] 16030100710100006d030289c8e77f54d29983bb100f979b4428706279f39192...
client: Filtered packet: [118] 16030100710100006d030189c8e77f54d29983bb100f979b4428706279f39192...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 4
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 4
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] TlsConnectTest.TestDowngradeDetectionToTls10 (71 ms)
[ RUN      ] TlsConnectTest.TestFallbackFromTls12
Version: TLS (no version)
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 5
client: Readable
client: Handshake
client: Handshake failed with SSL error 29: SSL received a malformed Server Hello handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] TlsConnectTest.TestFallbackFromTls12 (39 ms)
[----------] 3 tests from TlsConnectTest (158 ms total)

[----------] 1 test from DtlsConnectTest
[ RUN      ] DtlsConnectTest.TestDtlsVersion11
Version: DTLS (no version)
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [160] fefddcf267b7401013fb564924d2427da79fda2eb06fe4d4868d71f747092854...
handshake new: [160] fefedcf267b7401013fb564924d2427da79fda2eb06fe4d4868d71f747092854...
record old: [172] 010000a000000000000000a0fefddcf267b7401013fb564924d2427da79fda2e...
record new: [172] 010000a000000000000000a0fefedcf267b7401013fb564924d2427da79fda2e...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefddcf267b740...
client: Filtered packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefedcf267b740...
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 9: Peer using unsupported version of security protocol.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 7
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] DtlsConnectTest.TestDtlsVersion11 (35 ms)
[----------] 1 test from DtlsConnectTest (35 ms total)

[----------] 4 tests from AgentTests/TlsAgentTest
[ RUN      ] AgentTests/TlsAgentTest.EarlyFinished/0
client: Changing state from INIT to CONNECTING
client: Handshake
client: Handshake failed with SSL error 50: SSL received an unexpected Finished handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] AgentTests/TlsAgentTest.EarlyFinished/0 (6 ms)
[ RUN      ] AgentTests/TlsAgentTest.EarlyFinished/1
server: Changing state from INIT to CONNECTING
server: Handshake
server: Handshake failed with SSL error 50: SSL received an unexpected Finished handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] AgentTests/TlsAgentTest.EarlyFinished/1 (22 ms)
[ RUN      ] AgentTests/TlsAgentTest.EarlyCertificateVerify/0
client: Changing state from INIT to CONNECTING
client: Handshake
client: Handshake failed with SSL error 48: SSL received an unexpected Certificate Verify handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/0 (7 ms)
[ RUN      ] AgentTests/TlsAgentTest.EarlyCertificateVerify/1
server: Changing state from INIT to CONNECTING
server: Handshake
server: Handshake failed with SSL error 48: SSL received an unexpected Certificate Verify handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/1 (24 ms)
[----------] 4 tests from AgentTests/TlsAgentTest (60 ms total)

[----------] 93 tests from GenericStream/TlsConnectGeneric
[ RUN      ] GenericStream/TlsConnectGeneric.ClientAuth/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 8
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 7
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ClientAuth/0 (95 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ClientAuth/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 8
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 8
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ClientAuth/1 (96 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ClientAuth/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 9
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 9
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ClientAuth/2 (96 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 10
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 10
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/0 (76 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 11
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 11
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/1 (77 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 12
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 12
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/2 (77 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 13
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 13
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/0 (107 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 14
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 14
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/1 (108 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 15
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 15
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/2 (106 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 16
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 16
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 (103 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 17
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 17
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 (105 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 18
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 18
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/2 (105 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 19
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 19
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 (88 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 20
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 20
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 (89 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 21
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 21
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/2 (89 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 22
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 22
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 (104 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 23
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 23
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 (105 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 24
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 24
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/2 (105 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectDhe/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 25
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 25
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ConnectDhe/0 (145 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectDhe/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 26
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 26
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectDhe/1 (147 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectDhe/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 27
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 27
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectDhe/2 (147 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 28
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 28
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/0 (146 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 29
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 29
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/1 (145 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 30
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 30
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/2 (146 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.Ffdhe3072/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 31
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 31
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/0 (288 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.Ffdhe3072/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 32
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 32
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/1 (290 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.Ffdhe3072/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 33
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 33
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/2 (290 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SetupOnly/0
Version: TLS 1.2
[       OK ] GenericStream/TlsConnectGeneric.SetupOnly/0 (5 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SetupOnly/1
Version: TLS 1.1
[       OK ] GenericStream/TlsConnectGeneric.SetupOnly/1 (5 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.SetupOnly/2
Version: TLS 1.0
[       OK ] GenericStream/TlsConnectGeneric.SetupOnly/2 (5 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.Connect/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 34
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 34
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.Connect/0 (76 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.Connect/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 35
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 35
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.Connect/1 (77 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.Connect/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 36
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 36
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.Connect/2 (73 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectEcdsa/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 37
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 37
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/0 (87 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectEcdsa/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 38
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 38
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/1 (89 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectEcdsa/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 39
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 39
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/2 (89 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectAlpn/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 40
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 40
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/0 (76 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectAlpn/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 41
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 41
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/1 (76 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectAlpn/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 42
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 42
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/2 (77 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 43
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 43
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/0 (91 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 44
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 44
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/1 (91 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 45
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 45
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/2 (91 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectEcdhe/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 46
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 46
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/0 (76 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectEcdhe/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 47
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 46
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/1 (77 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectEcdhe/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 47
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 47
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/2 (77 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectSendReceive/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 48
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 47
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 47
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/0 (81 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectSendReceive/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 48
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 47
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 48
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/1 (81 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectSendReceive/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 49
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 47
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 48
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 48
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/2 (84 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectWithCompressionMaybe/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 49
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 48
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 49
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionMaybe/0 (79 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectWithCompressionMaybe/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 50
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 50
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 51
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionMaybe/1 (78 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectWithCompressionMaybe/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 51
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 52
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 52
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionMaybe/2 (85 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectClientCacheDisabled/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 53
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 53
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 54
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 53
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 54
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectClientCacheDisabled/0 (153 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectClientCacheDisabled/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 54
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 55
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 56
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 55
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 56
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectClientCacheDisabled/1 (155 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectClientCacheDisabled/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 57
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 56
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 57
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 57
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 58
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 57
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 58
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 58
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectClientCacheDisabled/2 (160 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectServerCacheDisabled/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 59
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 58
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 59
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 60
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 60
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 61
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectServerCacheDisabled/0 (144 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectServerCacheDisabled/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 62
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 61
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 62
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 63
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 63
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 63
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectServerCacheDisabled/1 (153 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectServerCacheDisabled/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 64
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 64
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 65
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 65
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 66
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 65
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 66
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 66
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectServerCacheDisabled/2 (158 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectSessionCacheDisabled/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 67
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 66
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 67
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 68
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 67
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 68
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectSessionCacheDisabled/0 (154 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectSessionCacheDisabled/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 69
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 68
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 69
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 70
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 70
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 71
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectSessionCacheDisabled/1 (157 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectSessionCacheDisabled/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 71
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 72
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 72
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 73
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 73
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectSessionCacheDisabled/2 (158 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeSupportBoth/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 74
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 75
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 76
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeSupportBoth/0 (144 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeSupportBoth/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 75
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 76
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 77
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeSupportBoth/1 (144 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeSupportBoth/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 76
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 77
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 77
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 79
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 79
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeSupportBoth/2 (145 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 78
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 79
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 79
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/0 (182 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 78
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 79
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 78
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 79
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/1 (189 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 79
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 80
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 80
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 79
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 80
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 79
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/2 (190 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 79
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 80
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 81
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/0 (142 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 81
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 81
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 82
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 83
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/1 (145 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 83
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 83
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 83
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 83
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 84
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 84
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/2 (147 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 84
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 84
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 85
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 85
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/0 (191 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 85
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 85
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 86
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/1 (190 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 87
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 87
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 88
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 85
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 85
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/2 (195 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothServerNone/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 86
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 85
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothServerNone/0 (151 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothServerNone/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 86
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 85
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 86
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothServerNone/1 (152 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothServerNone/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 86
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 86
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 86
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 86
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 86
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothServerNone/2 (159 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 85
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 86
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 85
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 86
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/0 (186 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 85
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 86
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 86
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/1 (186 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 85
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 85
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 85
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 85
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/2 (193 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 84
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 85
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 85
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 (191 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 83
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 83
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 82
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 83
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 (194 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 83
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 83
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 82
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 82
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2 (211 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 82
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/0 (161 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 79
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/1 (161 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 77
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/2 (160 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 76
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 74
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/0 (165 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/1 (168 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 70
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/2 (162 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 69
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/0 (77 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 70
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 68
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/1 (77 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/2
Version: TLS 1.0
[       OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/2 (5 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 69
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 68
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/0 (76 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/1
Version: TLS 1.1
[       OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/1 (5 ms)
[ RUN      ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/2
Version: TLS 1.0
[       OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/2 (6 ms)
[----------] 93 tests from GenericStream/TlsConnectGeneric (11474 ms total)

[----------] 62 tests from GenericDatagram/TlsConnectGeneric
[ RUN      ] GenericDatagram/TlsConnectGeneric.ClientAuth/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 70
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 69
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ClientAuth/0 (96 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ClientAuth/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 69
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 66
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ClientAuth/1 (101 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 68
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 68
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/0 (78 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 68
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 67
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/1 (76 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 68
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 63
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/0 (107 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 66
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 62
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/1 (105 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 63
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 59
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 (105 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 62
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 61
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 (106 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 61
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 60
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 (89 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 61
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 60
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 (89 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 61
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 60
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 (105 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 61
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 58
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 (106 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectDhe/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 61
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 57
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectDhe/0 (145 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectDhe/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 60
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 56
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectDhe/1 (149 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 59
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/0 (145 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 58
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 54
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/1 (144 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 57
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/0 (289 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 54
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/1 (288 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.SetupOnly/0
Version: DTLS 1.2
[       OK ] GenericDatagram/TlsConnectGeneric.SetupOnly/0 (6 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.SetupOnly/1
Version: DTLS 1.0
[       OK ] GenericDatagram/TlsConnectGeneric.SetupOnly/1 (6 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.Connect/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 51
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.Connect/0 (76 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.Connect/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 54
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 52
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.Connect/1 (76 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 53
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 52
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/0 (88 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 52
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/1 (90 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 52
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/0 (75 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/1 (74 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 54
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 52
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/0 (90 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/1 (91 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 54
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 52
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/0 (76 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 52
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/1 (75 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 54
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 52
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/0 (79 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 54
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 54
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/1 (80 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionMaybe/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 57
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 55
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 55
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionMaybe/0 (79 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionMaybe/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 58
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 56
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 56
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionMaybe/1 (80 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectClientCacheDisabled/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 59
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 57
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 57
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 60
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 59
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 59
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectClientCacheDisabled/0 (151 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectClientCacheDisabled/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 61
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 60
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 60
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 63
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 61
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 62
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectClientCacheDisabled/1 (154 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectServerCacheDisabled/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 64
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 62
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 62
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 65
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 63
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 63
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectServerCacheDisabled/0 (150 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectServerCacheDisabled/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 66
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 64
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 65
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 67
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 65
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 65
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectServerCacheDisabled/1 (152 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectSessionCacheDisabled/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 68
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 66
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 67
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 69
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 68
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 68
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectSessionCacheDisabled/0 (152 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectSessionCacheDisabled/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 70
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 68
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 68
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 69
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 69
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectSessionCacheDisabled/1 (159 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeSupportBoth/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 70
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 70
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 71
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 72
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeSupportBoth/0 (142 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeSupportBoth/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 72
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 72
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 74
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeSupportBoth/1 (143 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 75
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 76
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 76
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/0 (186 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 77
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 76
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 78
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 77
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientTicketServerBoth/1 (188 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 79
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 78
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 80
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/0 (141 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 80
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 79
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 80
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicket/1 (143 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 80
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 80
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 81
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/0 (182 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 80
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 81
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 80
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientServerTicketOnly/1 (187 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothServerNone/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 81
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 81
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 81
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 82
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothServerNone/0 (149 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothServerNone/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 81
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 81
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 81
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothServerNone/1 (151 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 81
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 81
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 82
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/0 (184 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 81
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 82
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 83
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientNoneServerBoth/1 (185 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 82
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 81
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 81
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 (191 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 82
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 82
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 82
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 82
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 (194 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/0 (155 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 82
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 82
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/1 (160 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 83
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 80
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/0 (162 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/1 (166 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 79
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/0 (76 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/1 (76 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 77
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/0 (76 ms)
[ RUN      ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/1
Version: DTLS 1.0
[       OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/1 (5 ms)
[----------] 62 tests from GenericDatagram/TlsConnectGeneric (7645 ms total)

[----------] 6 tests from StreamOnly/TlsConnectStream
[ RUN      ] StreamOnly/TlsConnectStream.ShortRead/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 75
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Writing 1200 bytes
Poll() waiters = 2 timers = 74
client: Readable
client: ReadBytes 1024
client: Re-arming
client: ReadBytes 176
client: Re-arming
[       OK ] StreamOnly/TlsConnectStream.ShortRead/0 (81 ms)
[ RUN      ] StreamOnly/TlsConnectStream.ShortRead/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Writing 1200 bytes
Poll() waiters = 2 timers = 74
client: Readable
client: ReadBytes 1024
client: Re-arming
client: ReadBytes 176
client: Re-arming
[       OK ] StreamOnly/TlsConnectStream.ShortRead/1 (80 ms)
[ RUN      ] StreamOnly/TlsConnectStream.ShortRead/2
Version: TLS 1.0
[       OK ] StreamOnly/TlsConnectStream.ShortRead/2 (5 ms)
[ RUN      ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 74
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/0 (77 ms)
[ RUN      ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/1 (77 ms)
[ RUN      ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/2 (77 ms)
[----------] 6 tests from StreamOnly/TlsConnectStream (399 ms total)

[----------] 84 tests from Pre13Stream/TlsConnectGenericPre13
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 72
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 (48 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 71
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 (48 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 72
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/2 (46 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
server: Readable
server: Handshake
server: Send Direct [6] 140301000101
client: Handshake
client: Handshake success
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [59] 14030100010116030100309f82cb42efe01fd123e780538892ff0a2571522ae3...
server: Filtered packet: [53] 16030100309f82cb42efe01fd123e780538892ff0a2571522ae3dded3b9ebdbe...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Writing 10 bytes
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake success
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 71
client: Readable
client: ReadBytes 9
client: Re-arming
server: Readable
server: ReadBytes 9
server: Re-arming
[       OK ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 (88 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
Poll() waiters = 2 timers = 71
server: Readable
server: Handshake
server: Send Direct [6] 140302000101
client: Handshake
client: Handshake success
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [75] 140302000101160302004067293ef9b4aeef8b979892a7ab9fb96a362170fbc0...
server: Filtered packet: [69] 160302004067293ef9b4aeef8b979892a7ab9fb96a362170fbc0126ee44de183...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake success
client: Read --> wouldblock 5
client: ReadBytes -1
client: Read error -5998: The operation would have blocked
client: Re-arming
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Writing 10 bytes
Poll() waiters = 2 timers = 71
server: Readable
server: ReadBytes 10
server: Re-arming
client: Readable
client: ReadBytes 10
client: Re-arming
[       OK ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 (90 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
server: Readable
server: Handshake
server: Send Direct [6] 140303000101
client: Handshake
client: Handshake success
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [51] 1403030001011603030028000000000000000087bedbb5fd080a073c1a295d8c...
server: Filtered packet: [45] 1603030028000000000000000087bedbb5fd080a073c1a295d8cc3b325ed777e...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Writing 10 bytes
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake success
client: ReadBytes 10
client: Re-arming
server: Readable
server: ReadBytes 10
server: Re-arming
[       OK ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/2 (70 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Send Direct [6] 140301000101
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [59] 1403010001011603010030227b7ccf33ff954ca59ac71e09dcf7dffc3594165c...
server: Filtered packet: [53] 1603010030227b7ccf33ff954ca59ac71e09dcf7dffc3594165c3b953dd50a07...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes 1
server: Re-arming
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Writing 10 bytes
Poll() waiters = 2 timers = 72
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 9
server: Re-arming
Poll() waiters = 2 timers = 71
client: Readable
client: ReadBytes 9
client: Re-arming
[       OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 (76 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Send Direct [6] 140302000101
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [75] 1403020001011603020040e6a340fcc5a605b1a78e3e0bab649c17fe4f0b02d1...
server: Filtered packet: [69] 1603020040e6a340fcc5a605b1a78e3e0bab649c17fe4f0b02d1dee269d5730b...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 70
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes 10
server: Re-arming
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Writing 10 bytes
Poll() waiters = 2 timers = 71
client: Readable
client: ReadBytes 10
client: Re-arming
[       OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 (84 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 72
server: Readable
server: Handshake
server: Send Direct [6] 140303000101
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [51] 140303000101160303002800000000000000003b45995508d4149dc62080b79b...
server: Filtered packet: [45] 160303002800000000000000003b45995508d4149dc62080b79b8e184411080e...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Writing 10 bytes
Poll() waiters = 2 timers = 71
server: Readable
server: ReadBytes 10
server: Re-arming
client: Readable
client: ReadBytes 10
client: Re-arming
[       OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/2 (86 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 72
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/0 (23 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 73
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/1 (23 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 74
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/2 (23 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510301a3d02229b825369040ec8fa3ec049c715e7c9687dcdc0b313fb4...
record new: [1184] 020000510301a3d02229b825369040ec8fa3ec049c715e7c9687dcdc0b313fb4...
server: Original packet: [1189] 16030104a0020000510301a3d02229b825369040ec8fa3ec049c715e7c9687dc...
server: Filtered packet: [1189] 16030104a0020000510301a3d02229b825369040ec8fa3ec049c715e7c9687dc...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake failed with SSL error 115: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/0 (60 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103023f200dbd597529669d48b68541d0b9bfd6037136282c6c15a074...
record new: [1184] 0200005103023f200dbd597529669d48b68541d0b9bfd6037136282c6c15a074...
server: Original packet: [1189] 16030204a00200005103023f200dbd597529669d48b68541d0b9bfd603713628...
server: Filtered packet: [1189] 16030204a00200005103023f200dbd597529669d48b68541d0b9bfd603713628...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake failed with SSL error 115: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/1 (72 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 0200005103030174c7125cc94baa6c55b67abc5f19af5f4f648706e2dda84b66...
record new: [1186] 0200005103030174c7125cc94baa6c55b67abc5f19af5f4f648706e2dda84b66...
server: Original packet: [1191] 16030304a20200005103030174c7125cc94baa6c55b67abc5f19af5f4f648706...
server: Filtered packet: [1191] 16030304a20200005103030174c7125cc94baa6c55b67abc5f19af5f4f648706...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake failed with SSL error 115: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/2 (71 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510301bb630c6b900dac92f442b255742360d9adae2565c5c8b78ef1d2...
record new: [1184] 020000510301bb630c6b900dac92f442b255742360d9adae2565c5c8b78ef1d2...
server: Original packet: [1189] 16030104a0020000510301bb630c6b900dac92f442b255742360d9adae2565c5...
server: Filtered packet: [1189] 16030104a0020000510301bb630c6b900dac92f442b255742360d9adae2565c5...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/0 (71 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103028655d66d2bfced5f45256a87273c1a4ba2575e8a32de70633fb9...
record new: [1184] 0200005103028655d66d2bfced5f45256a87273c1a4ba2575e8a32de70633fb9...
server: Original packet: [1189] 16030204a00200005103028655d66d2bfced5f45256a87273c1a4ba2575e8a32...
server: Filtered packet: [1189] 16030204a00200005103028655d66d2bfced5f45256a87273c1a4ba2575e8a32...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/1 (62 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 020000510303db9bf526bf4764f2ed44c6ef595d62dd5f3b348a5ebf2ab8c127...
record new: [1186] 020000510303db9bf526bf4764f2ed44c6ef595d62dd5f3b348a5ebf2ab8c127...
server: Original packet: [1191] 16030304a2020000510303db9bf526bf4764f2ed44c6ef595d62dd5f3b348a5e...
server: Filtered packet: [1191] 16030304a2020000510303db9bf526bf4764f2ed44c6ef595d62dd5f3b348a5e...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/2 (60 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.PadDheP/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce...
record old: [1184] 0200005103019f027308fc6dcf678910615f83831088a5ec4427c2b862e955cc...
record new: [1185] 0200005103019f027308fc6dcf678910615f83831088a5ec4427c2b862e955cc...
server: Original packet: [1189] 16030104a00200005103019f027308fc6dcf678910615f83831088a5ec4427c2...
server: Filtered packet: [1190] 16030104a10200005103019f027308fc6dcf678910615f83831088a5ec4427c2...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake failed with error -8023: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.PadDheP/0 (71 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.PadDheP/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce...
record old: [1184] 020000510302276a5f4b12271ba40ed20b17a8eddc6e0e3580d7367d9edc4e1b...
record new: [1185] 020000510302276a5f4b12271ba40ed20b17a8eddc6e0e3580d7367d9edc4e1b...
server: Original packet: [1189] 16030204a0020000510302276a5f4b12271ba40ed20b17a8eddc6e0e3580d736...
server: Filtered packet: [1190] 16030204a1020000510302276a5f4b12271ba40ed20b17a8eddc6e0e3580d736...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake failed with error -8023: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.PadDheP/1 (61 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.PadDheP/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce...
record old: [1186] 02000051030398a15205fe6319790b54320a131d3983541578847199ad80821d...
record new: [1187] 02000051030398a15205fe6319790b54320a131d3983541578847199ad80821d...
server: Original packet: [1191] 16030304a202000051030398a15205fe6319790b54320a131d39835415788471...
server: Filtered packet: [1192] 16030304a302000051030398a15205fe6319790b54320a131d39835415788471...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake failed with error -8182: Peer's certificate has an invalid signature.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.PadDheP/2 (71 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 1
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/0 (17994 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 2
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 2
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/1 (147 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 3
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 3
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/2 (145 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 4
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 4
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/0 (289 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 5
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 5
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/1 (289 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 6
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 6
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/2 (288 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 7
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 7
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 8
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 (103 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 9
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 9
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 10
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 (103 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 11
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 11
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 12
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 12
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/2 (102 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 13
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 13
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 (48 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 14
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 14
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 (48 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 15
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 15
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/2 (47 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 16
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 16
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 17
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 17
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 (103 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 18
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 18
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 19
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 (103 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 20
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 20
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 21
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 21
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/2 (103 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 22
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 22
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 23
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 23
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 (137 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 24
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 24
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 25
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 (129 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 26
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 26
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 27
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 27
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/2 (135 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 28
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 28
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 (78 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 29
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 29
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 (76 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 30
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 30
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/2 (76 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 31
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 31
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 (78 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 32
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 32
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 (76 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 33
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 33
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/2 (77 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 34
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 34
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0228
server: Handshake failed with SSL error 136: The peer tried to resume without a correct extended_master_secret extension
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 35
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 (99 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 36
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 36
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0228
server: Handshake failed with SSL error 136: The peer tried to resume without a correct extended_master_secret extension
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 37
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 (97 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 38
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 38
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0228
server: Handshake failed with SSL error 136: The peer tried to resume without a correct extended_master_secret extension
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 39
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/2 (98 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 40
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 40
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 41
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 41
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 (143 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 42
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 42
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 43
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 43
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 (141 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 44
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 44
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 45
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 45
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/2 (145 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 46
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 46
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/0 (74 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 47
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 47
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/1 (74 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 48
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 48
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/2 (74 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 49
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 49
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 (74 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 50
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 50
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 (74 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 51
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 51
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/2 (74 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
Poll() waiters = 2 timers = 52
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake success
client: Read --> wouldblock 5
client: ReadBytes -1
client: Read error -5998: The operation would have blocked
client: Re-arming
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 53
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 53
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/0 (85 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 54
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
Poll() waiters = 2 timers = 54
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake success
client: Read --> wouldblock 5
client: ReadBytes -1
client: Read error -5998: The operation would have blocked
client: Re-arming
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 55
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/1 (82 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 56
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 57
client: Readable
client: Handshake success
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/2 (74 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [199] 0300174104b7efabf882c54bfe29e1901ec4d092bad166b4c57d6550584a59df...
handshake new: [4] 03001700
record old: [740] 020000570301f50cac2759d02e8da0e870bfdb74bc76155c1d86988349a93863...
record new: [545] 020000570301f50cac2759d02e8da0e870bfdb74bc76155c1d86988349a93863...
server: Original packet: [745] 16030102e4020000570301f50cac2759d02e8da0e870bfdb74bc76155c1d8698...
server: Filtered packet: [550] 1603010221020000570301f50cac2759d02e8da0e870bfdb74bc76155c1d8698...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 58
client: Readable
client: Handshake
client: Handshake failed with SSL error 31: SSL received a malformed Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 58
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 (48 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [199] 0300174104b7efabf882c54bfe29e1901ec4d092bad166b4c57d6550584a59df...
handshake new: [4] 03001700
record old: [740] 0200005703029b2f8109e00088d6ceca60f4a535aad0d14b28109f6a2c2749b9...
record new: [545] 0200005703029b2f8109e00088d6ceca60f4a535aad0d14b28109f6a2c2749b9...
server: Original packet: [745] 16030202e40200005703029b2f8109e00088d6ceca60f4a535aad0d14b28109f...
server: Filtered packet: [550] 16030202210200005703029b2f8109e00088d6ceca60f4a535aad0d14b28109f...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 59
client: Readable
client: Handshake
client: Handshake failed with SSL error 31: SSL received a malformed Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 59
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 (35 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [201] 0300174104b7efabf882c54bfe29e1901ec4d092bad166b4c57d6550584a59df...
handshake new: [4] 03001700
record old: [742] 020000570303004b4d2bf7e07f83598f11936d7657ffc964316a204663a3b97f...
record new: [545] 020000570303004b4d2bf7e07f83598f11936d7657ffc964316a204663a3b97f...
server: Original packet: [747] 16030302e6020000570303004b4d2bf7e07f83598f11936d7657ffc964316a20...
server: Filtered packet: [550] 1603030221020000570303004b4d2bf7e07f83598f11936d7657ffc964316a20...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 60
client: Readable
client: Handshake
client: Handshake failed with SSL error 31: SSL received a malformed Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/2 (35 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 61
client: Readable
client: Handshake
handshake old: [66] 41043ce038ab87b39b3bd45b26e7cf25cd0a2162dafdcf31e8a1de900f9d74b2...
handshake new: [1] 00
record old: [70] 1000004241043ce038ab87b39b3bd45b26e7cf25cd0a2162dafdcf31e8a1de90...
record new: [5] 1000000100
client: Original packet: [134] 16030100461000004241043ce038ab87b39b3bd45b26e7cf25cd0a2162dafdcf...
client: Filtered packet: [69] 1603010005100000010014030100010116030100306727d05c75d3998547a597...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 61
server: Readable
server: Handshake
server: Handshake failed with SSL error 35: SSL received a malformed Client Key Exchange handshake message.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 (56 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 62
client: Readable
client: Handshake
handshake old: [66] 4104ed1251087ff23c3cedcc92e29e7232d0df880bf93410a1a09b0fd2334634...
handshake new: [1] 00
record old: [70] 100000424104ed1251087ff23c3cedcc92e29e7232d0df880bf93410a1a09b0f...
record new: [5] 1000000100
client: Original packet: [150] 1603020046100000424104ed1251087ff23c3cedcc92e29e7232d0df880bf934...
client: Filtered packet: [85] 1603020005100000010014030200010116030200406f9e7cf0d19f5512d44eaa...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 62
server: Readable
server: Handshake
server: Handshake failed with SSL error 35: SSL received a malformed Client Key Exchange handshake message.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 (55 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 63
client: Readable
client: Handshake
handshake old: [66] 41047f563289caf6b629789018f7ad74c2be2d55585b5e5c31fdae40afb9c76e...
handshake new: [1] 00
record old: [70] 1000004241047f563289caf6b629789018f7ad74c2be2d55585b5e5c31fdae40...
record new: [5] 1000000100
client: Original packet: [126] 16030300461000004241047f563289caf6b629789018f7ad74c2be2d55585b5e...
client: Filtered packet: [61] 1603030005100000010014030300010116030300280000000000000000f342dc...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 35: SSL received a malformed Client Key Exchange handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 63
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/2 (55 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 64
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 64
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 65
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/0 (96 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 66
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 66
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 67
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 67
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/1 (104 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 68
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 68
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 69
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 69
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/2 (105 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 70
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 70
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 70
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/0 (161 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/1 (155 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/2 (134 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 74
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 (132 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 (132 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/2 (130 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 77
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 78
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 (148 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 79
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 80
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 (147 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/2 (153 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 81
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/0 (49 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/1 (54 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/2 (56 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 80
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 (53 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 (47 ms)
[ RUN      ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/2 (42 ms)
[----------] 84 tests from Pre13Stream/TlsConnectGenericPre13 (25685 ms total)

[----------] 56 tests from Pre13Datagram/TlsConnectGenericPre13
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 83
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 (39 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 87
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 (37 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
server: Readable
server: Handshake
server: Send Direct [14] 14feff0000000000000004000101
client: Handshake
client: Handshake success
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [91] 14feff000000000000000400010116feff00010000000000000040cee9a18963...
server: Filtered packet: [77] 16feff00010000000000000040cee9a1896345c8f474b664efd280670a324722...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Writing 10 bytes
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake success
client: ReadBytes 10
client: Re-arming
server: Readable
server: ReadBytes 10
server: Re-arming
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 (68 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
Poll() waiters = 2 timers = 83
server: Readable
server: Handshake
server: Send Direct [14] 14fefd0000000000000004000101
client: Handshake
client: Handshake success
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [75] 14fefd000000000000000400010116fefd000100000000000000300001000000...
server: Filtered packet: [61] 16fefd00010000000000000030000100000000000072a6a7c54dfef8cab5a0d1...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake success
client: ReadBytes -1
client: Read error -5998: The operation would have blocked
client: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Writing 10 bytes
Poll() waiters = 2 timers = 83
server: Readable
server: ReadBytes 10
server: Re-arming
client: Readable
client: ReadBytes 10
client: Re-arming
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 (69 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 84
server: Readable
server: Handshake
server: Send Direct [14] 14feff0000000000000004000101
client: Handshake
client: Would have blocked
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [91] 14feff000000000000000400010116feff00010000000000000040e26fd64b87...
server: Filtered packet: [77] 16feff00010000000000000040e26fd64b87017f1efb1075d487ac52401f7e0e...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Writing 10 bytes
Poll() waiters = 2 timers = 86
server: Readable
server: ReadBytes 10
server: Re-arming
client: Readable
client: ReadBytes 10
client: Re-arming
[       OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 (69 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Send Direct [14] 14fefd0000000000000004000101
client: Handshake
client: Would have blocked
record drop: [1] 01
client: Writing 10 bytes
server: Original packet: [75] 14fefd000000000000000400010116fefd000100000000000000300001000000...
server: Filtered packet: [61] 16fefd000100000000000000300001000000000000804e4a9de7a5150d29149c...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes 10
server: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Writing 10 bytes
Poll() waiters = 2 timers = 87
client: Readable
client: ReadBytes 10
client: Re-arming
[       OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 (69 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 89
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/0 (23 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 88
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/1 (23 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffb6ffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff0509c33d0c...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff0509c33d0c...
server: Would have blocked
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Handshake failed with SSL error 115: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 86
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/0 (60 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffb6ffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd2676797ecf...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd2676797ecf...
server: Would have blocked
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Handshake failed with SSL error 115: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 86
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/1 (59 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff73d9de1e0d...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff73d9de1e0d...
server: Would have blocked
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/0 (70 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd024af5e19b...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd024af5e19b...
server: Would have blocked
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/1 (71 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [662] 0c00028a000200000000028a010100ffffffffffffffffadf85458a2bb4a9aaf...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff2c596f3655...
server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feff2c596f3655...
server: Would have blocked
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Handshake failed with error -8023: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/0 (60 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [664] 0c00028c000200000000028c010100ffffffffffffffffadf85458a2bb4a9aaf...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd2d0f48188c...
server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd2d0f48188c...
server: Would have blocked
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Handshake failed with error -8182: Peer's certificate has an invalid signature.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/1 (70 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/0 (147 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/1 (147 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/0 (290 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/1 (289 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 77
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 (102 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 77
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 (101 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 80
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 (47 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 (46 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 (101 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 79
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 (100 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 (136 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 75
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 (134 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 (76 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 76
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 (75 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 (76 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 76
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 (76 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Alert: [2] 0228
server: Handshake failed with SSL error 136: The peer tried to resume without a correct extended_master_secret extension
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 77
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 (97 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 77
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Alert: [2] 0228
server: Handshake failed with SSL error 136: The peer tried to resume without a correct extended_master_secret extension
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 78
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 (95 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 (144 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 75
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 75
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 (143 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 75
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/0 (74 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/1 (76 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 (74 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 74
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 (73 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake success
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes -1
client: Read error -5998: The operation would have blocked
client: Re-arming
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/0 (80 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
Poll() waiters = 2 timers = 74
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake success
client: ReadBytes -1
client: Read error -5998: The operation would have blocked
client: Re-arming
client: Readable
client: ReadBytes -1
client: Read error -5998: The operation would have blocked
client: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 74
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/1 (82 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [199] 0300174104b7efabf882c54bfe29e1901ec4d092bad166b4c57d6550584a59df...
handshake new: [4] 03001700
record old: [211] 0c0000c700020000000000c70300174104b7efabf882c54bfe29e1901ec4d092...
record new: [16] 0c000004000200000000000403001700
server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feffaaead11765...
server: Filtered packet: [629] 16feff00000000000000000063020000570000000000000057feffaaead11765...
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Handshake failed with SSL error 31: SSL received a malformed Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 (47 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [201] 0300174104b7efabf882c54bfe29e1901ec4d092bad166b4c57d6550584a59df...
handshake new: [4] 03001700
record old: [213] 0c0000c900020000000000c90300174104b7efabf882c54bfe29e1901ec4d092...
record new: [16] 0c000004000200000000000403001700
server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefddb5b93e0c9...
server: Filtered packet: [629] 16fefd00000000000000000063020000570000000000000057fefddb5b93e0c9...
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Handshake failed with SSL error 31: SSL received a malformed Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 76
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 (35 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
handshake old: [66] 4104660641d9caa7538907c2a17c7b053e49e90bd6e932a70855a8c22d4e9288...
handshake new: [1] 00
record old: [78] 1000004200010000000000424104660641d9caa7538907c2a17c7b053e49e90b...
record new: [13] 10000001000100000000000100
client: Original packet: [182] 16feff0000000000000001004e1000004200010000000000424104660641d9ca...
client: Filtered packet: [117] 16feff0000000000000001000d1000000100010000000000010014feff000000...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 35: SSL received a malformed Client Key Exchange handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 (68 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
handshake old: [66] 41047c44d5c58f9362a98cfdb483f1a036f4b7d6451a902635982dad2a1022c6...
handshake new: [1] 00
record old: [78] 10000042000100000000004241047c44d5c58f9362a98cfdb483f1a036f4b7d6...
record new: [13] 10000001000100000000000100
client: Original packet: [166] 16fefd0000000000000001004e10000042000100000000004241047c44d5c58f...
client: Filtered packet: [101] 16fefd0000000000000001000d1000000100010000000000010014fefd000000...
client: Would have blocked
Poll() waiters = 2 timers = 76
server: Readable
server: Handshake
server: Handshake failed with SSL error 35: SSL received a malformed Client Key Exchange handshake message.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 (68 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/0 (100 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 77
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 77
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/1 (100 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/0 (143 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 77
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 77
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumeWithHigherVersion/1 (143 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 (143 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 77
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 78
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 (138 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 (159 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 76
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 76
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 (156 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/0 (48 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 76
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/1 (46 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 (43 ms)
[ RUN      ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 79
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 (44 ms)
[----------] 56 tests from Pre13Datagram/TlsConnectGenericPre13 (5169 ms total)

[----------] 6 tests from Version12Only/TlsConnectTls12
[ RUN      ] Version12Only/TlsConnectTls12.SignatureAlgorithmNoOverlapEcdsa/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 126: Unsupported hash algorithm used by TLS peer.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 77
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] Version12Only/TlsConnectTls12.SignatureAlgorithmNoOverlapEcdsa/0 (19 ms)
[ RUN      ] Version12Only/TlsConnectTls12.SignatureAlgorithmNoOverlapEcdsa/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 126: Unsupported hash algorithm used by TLS peer.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 78
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] Version12Only/TlsConnectTls12.SignatureAlgorithmNoOverlapEcdsa/1 (20 ms)
[ RUN      ] Version12Only/TlsConnectTls12.ClientAuthNoMatchingSigAlgs/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 74
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] Version12Only/TlsConnectTls12.ClientAuthNoMatchingSigAlgs/0 (91 ms)
[ RUN      ] Version12Only/TlsConnectTls12.ClientAuthNoMatchingSigAlgs/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 77
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[       OK ] Version12Only/TlsConnectTls12.ClientAuthNoMatchingSigAlgs/1 (92 ms)
[ RUN      ] Version12Only/TlsConnectTls12.CertificateRequestMd5/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [12] 030140020004020104010000
handshake new: [12] 030140020004010104010000
record old: [758] 02000057030392f5d551dc415cd641fbb9737ad73e70dde12c3d485e07052c73...
record new: [758] 02000057030392f5d551dc415cd641fbb9737ad73e70dde12c3d485e07052c73...
server: Original packet: [763] 16030302f602000057030392f5d551dc415cd641fbb9737ad73e70dde12c3d48...
server: Filtered packet: [763] 16030302f602000057030392f5d551dc415cd641fbb9737ad73e70dde12c3d48...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 72
server: Readable
server: Handshake
server: Handshake failed with error -8182: Peer's certificate has an invalid signature.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] Version12Only/TlsConnectTls12.CertificateRequestMd5/0 (101 ms)
[ RUN      ] Version12Only/TlsConnectTls12.CertificateRequestMd5/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [12] 030140020004020104010000
handshake new: [12] 030140020004010104010000
record old: [24] 0d00000c000300000000000c030140020004020104010000
record new: [24] 0d00000c000300000000000c030140020004010104010000
server: Original packet: [863] 16fefd00000000000000000063020000570000000000000057fefd0678a416eb...
server: Filtered packet: [863] 16fefd00000000000000000063020000570000000000000057fefd0678a416eb...
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 74
server: Readable
server: Handshake
server: Handshake failed with error -8182: Peer's certificate has an invalid signature.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
server: Readable
[       OK ] Version12Only/TlsConnectTls12.CertificateRequestMd5/1 (98 ms)
[----------] 6 tests from Version12Only/TlsConnectTls12 (423 ms total)

[----------] 2 tests from Pre12Stream/TlsConnectPre12
[ RUN      ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 71
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 (84 ms)
[ RUN      ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 69
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/1 (88 ms)
[----------] 2 tests from Pre12Stream/TlsConnectPre12 (173 ms total)

[----------] 1 test from Pre12Datagram/TlsConnectPre12
[ RUN      ] Pre12Datagram/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 72
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
[       OK ] Pre12Datagram/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 (89 ms)
[----------] 1 test from Pre12Datagram/TlsConnectPre12 (90 ms total)

[----------] 4 tests from Version12Plus/TlsConnectTls12Plus
[ RUN      ] Version12Plus/TlsConnectTls12Plus.RequestClientAuthWithSha384/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 69
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Version12Plus/TlsConnectTls12Plus.RequestClientAuthWithSha384/0 (76 ms)
[ RUN      ] Version12Plus/TlsConnectTls12Plus.RequestClientAuthWithSha384/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Version12Plus/TlsConnectTls12Plus.RequestClientAuthWithSha384/1 (75 ms)
[ RUN      ] Version12Plus/TlsConnectTls12Plus.ConnectExtendedMasterSecretSha384/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 70
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 71
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] Version12Plus/TlsConnectTls12Plus.ConnectExtendedMasterSecretSha384/0 (81 ms)
[ RUN      ] Version12Plus/TlsConnectTls12Plus.ConnectExtendedMasterSecretSha384/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 75
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 75
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] Version12Plus/TlsConnectTls12Plus.ConnectExtendedMasterSecretSha384/1 (81 ms)
[----------] 4 tests from Version12Plus/TlsConnectTls12Plus (314 ms total)

[----------] 12 tests from CipherSuiteRC4/TlsCipherSuiteTest
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0
Version: TLS 1.0
Cipher suite: TLS_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 74
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0 (53 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 76
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1 (72 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 78
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2 (92 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 79
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 80
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3 (82 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4
Version: TLS 1.1
Cipher suite: TLS_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 80
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 81
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4 (52 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 82
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 83
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5 (78 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 84
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 85
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6 (92 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 85
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7 (80 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 86
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8 (51 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 87
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 86
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9 (76 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 86
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 87
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10 (92 ms)
[ RUN      ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 88
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 87
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11 (80 ms)
[----------] 12 tests from CipherSuiteRC4/TlsCipherSuiteTest (905 ms total)

[----------] 12 tests from CipherSuiteAEAD12/TlsCipherSuiteTest
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 88
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 88
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0 (50 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 88
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 89
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1 (50 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2
Version: TLS 1.2
Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 90
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 88
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2 (208 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3
Version: TLS 1.2
Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 86
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 87
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3 (210 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 88
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 88
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4 (93 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 88
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 89
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5 (84 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6
Version: DTLS 1.2
Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 92
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 92
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 93
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6 (50 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7
Version: DTLS 1.2
Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 96
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 93
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 94
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7 (50 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8
Version: DTLS 1.2
Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 96
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 90
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8 (206 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9
Version: DTLS 1.2
Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 93
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 86
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9 (211 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 86
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10 (96 ms)
[ RUN      ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 88
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 87
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 86
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11 (82 ms)
[----------] 12 tests from CipherSuiteAEAD12/TlsCipherSuiteTest (1395 ms total)

[----------] 18 tests from CipherSuiteAEAD/TlsCipherSuiteTest
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 83
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 83
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0 (92 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 83
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1 (93 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 83
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 83
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2 (84 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 81
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 81
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3 (87 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 80
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4 (160 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 76
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5 (142 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 75
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 75
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6 (79 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 77
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7 (67 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 76
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8 (135 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 79
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 78
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9 (79 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 80
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 78
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10 (80 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 80
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11 (67 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/12
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 80
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 81
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/12 (69 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/13
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 77
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/13 (137 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/14
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 76
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/14 (138 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/15
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 78
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 76
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/15 (79 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/16
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 78
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/16 (67 ms)
[ RUN      ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/17
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 74
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/17 (137 ms)
[----------] 18 tests from CipherSuiteAEAD/TlsCipherSuiteTest (1796 ms total)

[----------] 16 tests from CipherSuiteCBC12/TlsCipherSuiteTest
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 72
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 72
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0 (138 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 73
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1 (38 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 74
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2 (79 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 74
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3 (67 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 72
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 73
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4 (143 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 74
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5 (52 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6
Version: TLS 1.2
Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 70
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 71
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6 (209 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7
Version: TLS 1.2
Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 69
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 70
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7 (203 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 67
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 68
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8 (151 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9
Version: DTLS 1.2
Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 72
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9 (50 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 71
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 70
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10 (93 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 70
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 70
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11 (80 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 67
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 67
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12 (150 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13
Version: DTLS 1.2
Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 70
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 69
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 70
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13 (48 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14
Version: DTLS 1.2
Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 65
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 66
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14 (209 ms)
[ RUN      ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15
Version: DTLS 1.2
Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 69
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 61
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 62
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15 (209 ms)
[----------] 16 tests from CipherSuiteCBC12/TlsCipherSuiteTest (1924 ms total)

[----------] 36 tests from CipherSuiteCBCStream/TlsCipherSuiteTest
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 63
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 62
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 62
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0 (78 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 62
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 62
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 63
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 63
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1 (81 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 64
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 64
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 64
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 64
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2 (81 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 65
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 63
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 64
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 64
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3 (81 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 65
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 64
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 64
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4 (92 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 65
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 64
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 65
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 65
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5 (95 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 66
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 64
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 65
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 65
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6 (82 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 66
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 64
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 64
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 64
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7 (91 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 65
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 65
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 65
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8 (80 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 66
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 65
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 66
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 66
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9 (85 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 67
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 67
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 68
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 68
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10 (84 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 69
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 68
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 68
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 68
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11 (82 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 69
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 69
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 70
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12 (77 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 69
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 70
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13 (78 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 69
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 70
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14 (78 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 71
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 70
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15 (77 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 71
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 70
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16 (92 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 71
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17 (92 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 69
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 70
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18 (93 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 71
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 72
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19 (93 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 73
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20 (80 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 74
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21 (81 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 74
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 75
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22 (81 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 75
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23 (81 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 75
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 75
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24 (76 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 75
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25 (75 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 75
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26 (76 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 75
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27 (78 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 76
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 76
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28 (92 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 75
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29 (90 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 75
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30 (93 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 76
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31 (93 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 76
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 76
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32 (79 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 76
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 76
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33 (80 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 76
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34 (81 ms)
[ RUN      ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 76
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35 (81 ms)
[----------] 36 tests from CipherSuiteCBCStream/TlsCipherSuiteTest (3020 ms total)

[----------] 18 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0
Version: DTLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 80
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 78
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0 (78 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1
Version: DTLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 80
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 78
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1 (79 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2
Version: DTLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 78
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2 (78 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 80
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 78
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3 (94 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 80
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 78
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4 (91 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 80
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 78
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5 (94 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 80
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 79
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6 (80 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 80
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7 (81 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 81
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 81
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8 (80 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9
Version: DTLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 81
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9 (78 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10
Version: DTLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 82
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 81
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10 (77 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11
Version: DTLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 82
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11 (69 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 84
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 82
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12 (93 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 84
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 82
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13 (93 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 83
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 81
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14 (92 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 82
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15 (80 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 83
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 83
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16 (79 ms)
[ RUN      ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 84
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 83
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17 (80 ms)
[----------] 18 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest (1499 ms total)

[----------] 12 tests from ResumeRC4/TlsResumptionTest
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/0
Version: TLS 1.0
Cipher suite: TLS_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 81
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 82
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 82
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 83
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/0 (111 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/1
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 83
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 84
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 84
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 85
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/1 (128 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/2
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 85
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 84
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 86
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/2 (146 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/3
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 86
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 87
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 88
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 86
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 87
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/3 (146 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/4
Version: TLS 1.1
Cipher suite: TLS_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 88
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 86
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 87
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 88
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 88
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 89
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/4 (111 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/5
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 90
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 88
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 88
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 88
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 88
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 89
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/5 (129 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/6
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 90
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 88
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 89
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 90
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 90
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 90
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/6 (147 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/7
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 90
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 89
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 90
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 91
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/7 (143 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/8
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 92
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 90
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 91
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 92
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 92
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 93
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/8 (94 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/9
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 94
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 92
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 93
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 94
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 94
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/9 (106 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/10
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 95
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 93
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 94
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 95
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 95
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/10 (121 ms)
[ RUN      ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/11
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 96
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 94
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 95
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 96
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 96
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeRC4/TlsResumptionTest.ResumeCipherSuite/11 (119 ms)
[----------] 12 tests from ResumeRC4/TlsResumptionTest (1505 ms total)

[----------] 12 tests from ResumeAEAD12/TlsResumptionTest
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/0
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 97
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 96
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 97
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 98
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 97
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/0 (86 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/1
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 98
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 98
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 99
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 98
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 99
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/1 (89 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/2
Version: TLS 1.2
Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/2 (5 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/3
Version: TLS 1.2
Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/3 (5 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/4
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 99
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 99
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 101
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/4 (127 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/5
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 101
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 100
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 101
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/5 (125 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/6
Version: DTLS 1.2
Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 105
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 106
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 108
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/6 (86 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/7
Version: DTLS 1.2
Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 108
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 107
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 110
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 106
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/7 (100 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/8
Version: DTLS 1.2
Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/8 (6 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/9
Version: DTLS 1.2
Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/9 (6 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/10
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 107
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/10 (151 ms)
[ RUN      ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/11
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 110
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 105
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 106
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 107
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD12/TlsResumptionTest.ResumeCipherSuite/11 (148 ms)
[----------] 12 tests from ResumeAEAD12/TlsResumptionTest (936 ms total)

[----------] 18 tests from ResumeAEAD/TlsResumptionTest
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/0
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 105
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/0 (145 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/1
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 104
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 105
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/1 (144 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/2
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 105
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/2 (144 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/3
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/3 (146 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/4
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 102
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/4 (197 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/5
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 101
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 100
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 100
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 101
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/5 (216 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/6
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 98
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 99
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 100
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/6 (145 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/7
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 98
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 99
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 99
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 98
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 99
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/7 (139 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/8
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 96
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 97
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 98
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 98
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/8 (212 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/9
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 99
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 97
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 98
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 99
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/9 (146 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/10
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 96
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 97
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 99
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/10 (146 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/11
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 98
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 98
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 98
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 99
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/11 (142 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/12
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 98
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 98
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 99
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/12 (144 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/13
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 96
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 97
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 97
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 98
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/13 (213 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/14
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 93
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 94
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 97
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 96
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 97
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/14 (216 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/15
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 94
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 94
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 97
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 96
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 97
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/15 (141 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/16
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 97
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 97
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 97
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 97
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/16 (142 ms)
[ RUN      ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/17
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 95
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 94
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 97
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 96
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 96
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeAEAD/TlsResumptionTest.ResumeCipherSuite/17 (214 ms)
[----------] 18 tests from ResumeAEAD/TlsResumptionTest (2996 ms total)

[----------] 16 tests from ResumeCBC12/TlsResumptionTest
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/0
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 97
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 90
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 91
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 92
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 92
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/0 (214 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/1
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 93
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 92
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 93
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 93
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/1 (106 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/2
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 94
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 92
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 93
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 94
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 93
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 94
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/2 (146 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/3
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 95
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 92
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 93
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 94
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 94
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/3 (144 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/4
Version: TLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 95
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 90
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 91
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/4 (213 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/5
Version: TLS 1.2
Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 90
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 91
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/5 (111 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/6
Version: TLS 1.2
Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/6 (6 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/7
Version: TLS 1.2
Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/7 (6 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/8
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 94
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 88
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 90
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/8 (215 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/9
Version: DTLS 1.2
Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 93
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 91
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 92
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 95
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 91
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/9 (103 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/10
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 94
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 90
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 93
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 92
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/10 (123 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/11
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 95
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 92
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 93
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 96
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 92
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 93
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/11 (121 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/12
Version: DTLS 1.2
Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 95
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 88
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 88
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 89
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 90
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/12 (190 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/13
Version: DTLS 1.2
Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 93
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 92
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 91
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 94
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 94
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/13 (88 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/14
Version: DTLS 1.2
Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/14 (5 ms)
[ RUN      ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/15
Version: DTLS 1.2
Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
[       OK ] ResumeCBC12/TlsResumptionTest.ResumeCipherSuite/15 (5 ms)
[----------] 16 tests from ResumeCBC12/TlsResumptionTest (1799 ms total)

[----------] 36 tests from ResumeCBCStream/TlsResumptionTest
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/0
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 93
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 90
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 91
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 92
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/0 (106 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/1
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 93
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 91
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 92
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 92
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 93
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 91
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 92
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 92
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/1 (109 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/2
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 93
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 92
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 93
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 93
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 94
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 94
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 95
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 95
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/2 (109 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/3
Version: TLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 96
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 94
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 94
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 94
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 95
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 95
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 95
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/3 (109 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/4
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 96
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 94
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 94
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 95
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 94
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 95
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/4 (120 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/5
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 96
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 94
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 95
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 95
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 96
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 95
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 96
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 96
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/5 (124 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/6
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 97
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 95
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 95
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 95
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 96
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 97
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 97
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/6 (124 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/7
Version: TLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 98
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 96
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 97
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 97
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 98
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 99
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 99
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/7 (124 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/8
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 98
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 99
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 99
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 100
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/8 (137 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/9
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 98
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 99
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 99
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 99
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 100
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 100
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/9 (150 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/10
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 100
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 101
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 101
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 101
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 101
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/10 (136 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/11
Version: TLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 100
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 100
server: Readable
server: ReadBytes 1
server: Re-arming
client: Readable
client: ReadBytes 1
client: Re-arming
Poll() waiters = 2 timers = 100
server: Readable
server: ReadBytes 49
server: Re-arming
client: Readable
client: ReadBytes 49
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 100
client: Readable
client: ReadBytes 1
client: Re-arming
server: Readable
server: ReadBytes 1
server: Re-arming
Poll() waiters = 2 timers = 100
client: Readable
client: ReadBytes 49
client: Re-arming
server: Readable
server: ReadBytes 49
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/11 (150 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/12
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 101
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 99
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 101
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/12 (133 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/13
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 99
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 100
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 100
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 101
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/13 (131 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/14
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 102
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 101
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/14 (131 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/15
Version: TLS 1.1
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 101
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/15 (131 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/16
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 99
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 100
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/16 (146 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/17
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 99
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 100
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 100
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 101
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/17 (136 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/18
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 99
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 100
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 101
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/18 (146 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/19
Version: TLS 1.1
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 101
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 100
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 100
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 101
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/19 (144 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/20
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 100
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 100
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 101
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 101
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/20 (146 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/21
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 100
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 100
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/21 (137 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/22
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 99
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 100
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 101
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/22 (154 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/23
Version: TLS 1.1
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 101
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/23 (144 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/24
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 101
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/24 (114 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/25
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/25 (131 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/26
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/26 (131 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/27
Version: TLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/27 (132 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/28
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/28 (144 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/29
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 102
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 104
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 105
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/29 (146 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/30
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 104
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 105
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/30 (146 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/31
Version: TLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 105
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/31 (140 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/32
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 104
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 106
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/32 (138 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/33
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 105
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/33 (145 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/34
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 105
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/34 (143 ms)
[ RUN      ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/35
Version: TLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 104
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 105
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCStream/TlsResumptionTest.ResumeCipherSuite/35 (146 ms)
[----------] 36 tests from ResumeCBCStream/TlsResumptionTest (4838 ms total)

[----------] 18 tests from ResumeCBCDatagram/TlsResumptionTest
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/0
Version: DTLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 105
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 106
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 107
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/0 (133 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/1
Version: DTLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 110
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 107
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 107
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/1 (132 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/2
Version: DTLS 1.0
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 110
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 106
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 105
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 106
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/2 (132 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/3
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 105
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 104
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 105
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/3 (148 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/4
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 104
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/4 (147 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/5
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/5 (147 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/6
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/6 (143 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/7
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 102
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/7 (140 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/8
Version: DTLS 1.0
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/8 (143 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/9
Version: DTLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/9 (128 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/10
Version: DTLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/10 (128 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/11
Version: DTLS 1.2
Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/11 (135 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/12
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/12 (147 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/13
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 104
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/13 (145 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/14
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 100
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 101
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 102
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 103
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/14 (147 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/15
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/15 (141 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/16
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/16 (143 ms)
[ RUN      ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/17
Version: DTLS 1.2
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 103
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Poll() waiters = 2 timers = 101
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 102
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] ResumeCBCDatagram/TlsResumptionTest.ResumeCipherSuite/17 (142 ms)
[----------] 18 tests from ResumeCBCDatagram/TlsResumptionTest (2525 ms total)

[----------] 72 tests from DamageYStream/TlsDamageDHYTest
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103010ea0a354ae7dfe38b75dccc7696101f1ce44b9cd061bf7491b23...
record new: [1184] 0200005103010ea0a354ae7dfe38b75dccc7696101f1ce44b9cd061bf7491b23...
server: Original packet: [1189] 16030104a00200005103010ea0a354ae7dfe38b75dccc7696101f1ce44b9cd06...
server: Filtered packet: [1189] 16030104a00200005103010ea0a354ae7dfe38b75dccc7696101f1ce44b9cd06...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 100
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/0 (72 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/1
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 02000051030170258cc827b53c30bfedf6bf13216af8f7cc6a0fabb6e0ee834b...
record new: [1184] 02000051030170258cc827b53c30bfedf6bf13216af8f7cc6a0fabb6e0ee834b...
server: Original packet: [1189] 16030104a002000051030170258cc827b53c30bfedf6bf13216af8f7cc6a0fab...
server: Filtered packet: [1189] 16030104a002000051030170258cc827b53c30bfedf6bf13216af8f7cc6a0fab...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 101
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 98
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/1 (72 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103019a37c05aded8f418de4fab58719a6e7d289fe7353705a340303b...
record new: [1184] 0200005103019a37c05aded8f418de4fab58719a6e7d289fe7353705a340303b...
server: Original packet: [1189] 16030104a00200005103019a37c05aded8f418de4fab58719a6e7d289fe73537...
server: Filtered packet: [1189] 16030104a00200005103019a37c05aded8f418de4fab58719a6e7d289fe73537...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 99
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/2 (71 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/3
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103018791999c65e2efc40a80a9dd087f3ddf535cb46f42abf84e30f5...
record new: [1184] 0200005103018791999c65e2efc40a80a9dd087f3ddf535cb46f42abf84e30f5...
server: Original packet: [1189] 16030104a00200005103018791999c65e2efc40a80a9dd087f3ddf535cb46f42...
server: Filtered packet: [1189] 16030104a00200005103018791999c65e2efc40a80a9dd087f3ddf535cb46f42...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 99
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/3 (72 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/4
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510301ab20958f10980b486ab9d578a1a8e8e2ebf68554172aaf0ed3bb...
record new: [1184] 020000510301ab20958f10980b486ab9d578a1a8e8e2ebf68554172aaf0ed3bb...
server: Original packet: [1189] 16030104a0020000510301ab20958f10980b486ab9d578a1a8e8e2ebf6855417...
server: Filtered packet: [1189] 16030104a0020000510301ab20958f10980b486ab9d578a1a8e8e2ebf6855417...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 98
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/4 (62 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/5
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510301b0fbc97347f8542d86ebd0aab31b40e1559064f2de49d6d34157...
record new: [1184] 020000510301b0fbc97347f8542d86ebd0aab31b40e1559064f2de49d6d34157...
server: Original packet: [1189] 16030104a0020000510301b0fbc97347f8542d86ebd0aab31b40e1559064f2de...
server: Filtered packet: [1189] 16030104a0020000510301b0fbc97347f8542d86ebd0aab31b40e1559064f2de...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 97
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/5 (68 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/6
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510301b43f60d43eac573ff6a8790f51330412553e3390162b09cb2840...
record new: [1184] 020000510301b43f60d43eac573ff6a8790f51330412553e3390162b09cb2840...
server: Original packet: [1189] 16030104a0020000510301b43f60d43eac573ff6a8790f51330412553e339016...
server: Filtered packet: [1189] 16030104a0020000510301b43f60d43eac573ff6a8790f51330412553e339016...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 96
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/6 (60 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/7
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510301e92ae2c9e649fbd213554950431694f3b8198efc6777b3882921...
record new: [1184] 020000510301e92ae2c9e649fbd213554950431694f3b8198efc6777b3882921...
server: Original packet: [1189] 16030104a0020000510301e92ae2c9e649fbd213554950431694f3b8198efc67...
server: Filtered packet: [1189] 16030104a0020000510301e92ae2c9e649fbd213554950431694f3b8198efc67...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 95
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 94
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/7 (70 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/8
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 02000051030134fba4004315de0ed8829cb1a5fc07ff12697178870ae99ce024...
record new: [1185] 02000051030134fba4004315de0ed8829cb1a5fc07ff12697178870ae99ce024...
server: Original packet: [1189] 16030104a002000051030134fba4004315de0ed8829cb1a5fc07ff1269717887...
server: Filtered packet: [1190] 16030104a102000051030134fba4004315de0ed8829cb1a5fc07ff1269717887...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 95
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 92
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/8 (72 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/9
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510301c460b2924c874861eab3f7dba8ff7c31cd12b815d49ecee1232e...
record new: [1185] 020000510301c460b2924c874861eab3f7dba8ff7c31cd12b815d49ecee1232e...
server: Original packet: [1189] 16030104a0020000510301c460b2924c874861eab3f7dba8ff7c31cd12b815d4...
server: Filtered packet: [1190] 16030104a1020000510301c460b2924c874861eab3f7dba8ff7c31cd12b815d4...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 93
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/9 (67 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/10
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510301c8dc58d483cb5cff5140eaa6e55b46cdcaee607032029b8dc20c...
record new: [1185] 020000510301c8dc58d483cb5cff5140eaa6e55b46cdcaee607032029b8dc20c...
server: Original packet: [1189] 16030104a0020000510301c8dc58d483cb5cff5140eaa6e55b46cdcaee607032...
server: Filtered packet: [1190] 16030104a1020000510301c8dc58d483cb5cff5140eaa6e55b46cdcaee607032...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 93
client: Readable
client: Handshake
client: Handshake failed with error -8023: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 90
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/10 (71 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/11
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 02000051030176ecb162fa69ad921090ec25db01f68c1c470e10010e75472c36...
record new: [1185] 02000051030176ecb162fa69ad921090ec25db01f68c1c470e10010e75472c36...
server: Original packet: [1189] 16030104a002000051030176ecb162fa69ad921090ec25db01f68c1c470e1001...
server: Filtered packet: [1190] 16030104a102000051030176ecb162fa69ad921090ec25db01f68c1c470e1001...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Handshake failed with error -8023: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/11 (72 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/12
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510302e604218a8dccc92d3f1892954670e8158d2e968277cb5e7cc569...
record new: [1184] 020000510302e604218a8dccc92d3f1892954670e8158d2e968277cb5e7cc569...
server: Original packet: [1189] 16030204a0020000510302e604218a8dccc92d3f1892954670e8158d2e968277...
server: Filtered packet: [1189] 16030204a0020000510302e604218a8dccc92d3f1892954670e8158d2e968277...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 91
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/12 (72 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/13
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510302e916d2518b08c318b282fa41103a51ee093ad33a1c6321248c7e...
record new: [1184] 020000510302e916d2518b08c318b282fa41103a51ee093ad33a1c6321248c7e...
server: Original packet: [1189] 16030204a0020000510302e916d2518b08c318b282fa41103a51ee093ad33a1c...
server: Filtered packet: [1189] 16030204a0020000510302e916d2518b08c318b282fa41103a51ee093ad33a1c...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 89
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/13 (61 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/14
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510302042f33288d0c988fa448ca228bcab4845c77957237a1fb03d387...
record new: [1184] 020000510302042f33288d0c988fa448ca228bcab4845c77957237a1fb03d387...
server: Original packet: [1189] 16030204a0020000510302042f33288d0c988fa448ca228bcab4845c77957237...
server: Filtered packet: [1189] 16030204a0020000510302042f33288d0c988fa448ca228bcab4845c77957237...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 88
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/14 (73 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/15
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 02000051030218688de733c5cf42947626dced794470508304c100c66e754618...
record new: [1184] 02000051030218688de733c5cf42947626dced794470508304c100c66e754618...
server: Original packet: [1189] 16030204a002000051030218688de733c5cf42947626dced794470508304c100...
server: Filtered packet: [1189] 16030204a002000051030218688de733c5cf42947626dced794470508304c100...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 87
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/15 (62 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/16
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510302475dcc7201a39610bb523f67ffc45fbff9ac84a884a996f9e0ac...
record new: [1184] 020000510302475dcc7201a39610bb523f67ffc45fbff9ac84a884a996f9e0ac...
server: Original packet: [1189] 16030204a0020000510302475dcc7201a39610bb523f67ffc45fbff9ac84a884...
server: Filtered packet: [1189] 16030204a0020000510302475dcc7201a39610bb523f67ffc45fbff9ac84a884...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 84
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/16 (70 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/17
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510302e676099631e5096b29e18af403137157817a7dc98360f6576188...
record new: [1184] 020000510302e676099631e5096b29e18af403137157817a7dc98360f6576188...
server: Original packet: [1189] 16030204a0020000510302e676099631e5096b29e18af403137157817a7dc983...
server: Filtered packet: [1189] 16030204a0020000510302e676099631e5096b29e18af403137157817a7dc983...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 85
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/17 (72 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/18
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510302ec34cfd1deac5c3105450f9b630f86a4c3a94a8b1bc4f93f919d...
record new: [1184] 020000510302ec34cfd1deac5c3105450f9b630f86a4c3a94a8b1bc4f93f919d...
server: Original packet: [1189] 16030204a0020000510302ec34cfd1deac5c3105450f9b630f86a4c3a94a8b1b...
server: Filtered packet: [1189] 16030204a0020000510302ec34cfd1deac5c3105450f9b630f86a4c3a94a8b1b...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 82
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/18 (71 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/19
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103023169a7be8707f310838fca33fa1a21421fec9cced14e4d16e7fd...
record new: [1184] 0200005103023169a7be8707f310838fca33fa1a21421fec9cced14e4d16e7fd...
server: Original packet: [1189] 16030204a00200005103023169a7be8707f310838fca33fa1a21421fec9cced1...
server: Filtered packet: [1189] 16030204a00200005103023169a7be8707f310838fca33fa1a21421fec9cced1...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 83
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/19 (72 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/20
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 020000510302f505504117f55ec6034b5233c80916364c2e7a7f97391769753d...
record new: [1185] 020000510302f505504117f55ec6034b5233c80916364c2e7a7f97391769753d...
server: Original packet: [1189] 16030204a0020000510302f505504117f55ec6034b5233c80916364c2e7a7f97...
server: Filtered packet: [1190] 16030204a1020000510302f505504117f55ec6034b5233c80916364c2e7a7f97...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 82
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 80
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/20 (60 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/21
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 02000051030264184ea3d3c10366ddac945b2b4ea559f606664e89521d8a271d...
record new: [1185] 02000051030264184ea3d3c10366ddac945b2b4ea559f606664e89521d8a271d...
server: Original packet: [1189] 16030204a002000051030264184ea3d3c10366ddac945b2b4ea559f606664e89...
server: Filtered packet: [1190] 16030204a102000051030264184ea3d3c10366ddac945b2b4ea559f606664e89...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/21 (60 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/22
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103029ace63480152bbf56a165e54d00c5f57569c37d31349b549cad8...
record new: [1185] 0200005103029ace63480152bbf56a165e54d00c5f57569c37d31349b549cad8...
server: Original packet: [1189] 16030204a00200005103029ace63480152bbf56a165e54d00c5f57569c37d313...
server: Filtered packet: [1190] 16030204a10200005103029ace63480152bbf56a165e54d00c5f57569c37d313...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 81
client: Readable
client: Handshake
client: Handshake failed with error -8023: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 79
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/22 (62 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/23
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1184] 0200005103023dae314c4181c85a688dbd3468002dfdd37a78c201fa9b61208d...
record new: [1185] 0200005103023dae314c4181c85a688dbd3468002dfdd37a78c201fa9b61208d...
server: Original packet: [1189] 16030204a00200005103023dae314c4181c85a688dbd3468002dfdd37a78c201...
server: Filtered packet: [1190] 16030204a10200005103023dae314c4181c85a688dbd3468002dfdd37a78c201...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 80
client: Readable
client: Handshake
client: Handshake failed with error -8023: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/23 (73 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/24
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 0200005103037001312da8ea13aceb099b521069d09ade481221c0a269339454...
record new: [1186] 0200005103037001312da8ea13aceb099b521069d09ade481221c0a269339454...
server: Original packet: [1191] 16030304a20200005103037001312da8ea13aceb099b521069d09ade481221c0...
server: Filtered packet: [1191] 16030304a20200005103037001312da8ea13aceb099b521069d09ade481221c0...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 79
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/24 (60 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/25
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 020000510303b2b5dfa06838d95d878d039a01308bf4a83401ee45d6e1cfebbd...
record new: [1186] 020000510303b2b5dfa06838d95d878d039a01308bf4a83401ee45d6e1cfebbd...
server: Original packet: [1191] 16030304a2020000510303b2b5dfa06838d95d878d039a01308bf4a83401ee45...
server: Filtered packet: [1191] 16030304a2020000510303b2b5dfa06838d95d878d039a01308bf4a83401ee45...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 78
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 76
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/25 (72 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/26
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 02000051030357ba5c59e3475f048df3ef53f49212898858f00225aec4180aeb...
record new: [1186] 02000051030357ba5c59e3475f048df3ef53f49212898858f00225aec4180aeb...
server: Original packet: [1191] 16030304a202000051030357ba5c59e3475f048df3ef53f49212898858f00225...
server: Filtered packet: [1191] 16030304a202000051030357ba5c59e3475f048df3ef53f49212898858f00225...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 77
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 75
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/26 (72 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/27
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 0200005103032d4aea9a1aae7b6ef327f030d9893b7e231b24ffa85a76464ab1...
record new: [1186] 0200005103032d4aea9a1aae7b6ef327f030d9893b7e231b24ffa85a76464ab1...
server: Original packet: [1191] 16030304a20200005103032d4aea9a1aae7b6ef327f030d9893b7e231b24ffa8...
server: Filtered packet: [1191] 16030304a20200005103032d4aea9a1aae7b6ef327f030d9893b7e231b24ffa8...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 76
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/27 (71 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/28
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 020000510303080fdbe3c86d91109539fce3f3cd7176f81508eedf0e0ee6e606...
record new: [1186] 020000510303080fdbe3c86d91109539fce3f3cd7176f81508eedf0e0ee6e606...
server: Original packet: [1191] 16030304a2020000510303080fdbe3c86d91109539fce3f3cd7176f81508eedf...
server: Filtered packet: [1191] 16030304a2020000510303080fdbe3c86d91109539fce3f3cd7176f81508eedf...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 75
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/28 (71 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/29
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 02000051030317689d31bbdff01cb35c76ad5914b5613ff082cbec6258c99eac...
record new: [1186] 02000051030317689d31bbdff01cb35c76ad5914b5613ff082cbec6258c99eac...
server: Original packet: [1191] 16030304a202000051030317689d31bbdff01cb35c76ad5914b5613ff082cbec...
server: Filtered packet: [1191] 16030304a202000051030317689d31bbdff01cb35c76ad5914b5613ff082cbec...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 72
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/29 (62 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/30
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 0200005103039522d0eb259fed2132de9bc4696a729a0a5fa656ff5db8fb6b4f...
record new: [1186] 0200005103039522d0eb259fed2132de9bc4696a729a0a5fa656ff5db8fb6b4f...
server: Original packet: [1191] 16030304a20200005103039522d0eb259fed2132de9bc4696a729a0a5fa656ff...
server: Filtered packet: [1191] 16030304a20200005103039522d0eb259fed2132de9bc4696a729a0a5fa656ff...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/30 (60 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/31
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 0200005103030784cf1ee3ccd15c2e642d5e9aedb597c61eb58dad04e2e79908...
record new: [1186] 0200005103030784cf1ee3ccd15c2e642d5e9aedb597c61eb58dad04e2e79908...
server: Original packet: [1191] 16030304a20200005103030784cf1ee3ccd15c2e642d5e9aedb597c61eb58dad...
server: Filtered packet: [1191] 16030304a20200005103030784cf1ee3ccd15c2e642d5e9aedb597c61eb58dad...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/31 (60 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/32
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 02000051030313d3e1df7096ea5b8120a8315872e4b3cfa7cd49d67772dcd211...
record new: [1187] 02000051030313d3e1df7096ea5b8120a8315872e4b3cfa7cd49d67772dcd211...
server: Original packet: [1191] 16030304a202000051030313d3e1df7096ea5b8120a8315872e4b3cfa7cd49d6...
server: Filtered packet: [1192] 16030304a302000051030313d3e1df7096ea5b8120a8315872e4b3cfa7cd49d6...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/32 (60 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/33
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 02000051030375f758c079846712850d911f28999e886d43936a8a5935181223...
record new: [1187] 02000051030375f758c079846712850d911f28999e886d43936a8a5935181223...
server: Original packet: [1191] 16030304a202000051030375f758c079846712850d911f28999e886d43936a8a...
server: Filtered packet: [1192] 16030304a302000051030375f758c079846712850d911f28999e886d43936a8a...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 73
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/33 (59 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/34
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 02000051030369ef641accecea523ff218dacc278a7063e1e7b18efbae2ef975...
record new: [1187] 02000051030369ef641accecea523ff218dacc278a7063e1e7b18efbae2ef975...
server: Original packet: [1191] 16030304a202000051030369ef641accecea523ff218dacc278a7063e1e7b18e...
server: Filtered packet: [1192] 16030304a302000051030369ef641accecea523ff218dacc278a7063e1e7b18e...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake failed with error -8182: Peer's certificate has an invalid signature.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/34 (60 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageServerY/35
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [1186] 020000510303222dc33f49c88e935387f9e2fd91ed3277224102beb4c0593ef7...
record new: [1187] 020000510303222dc33f49c88e935387f9e2fd91ed3277224102beb4c0593ef7...
server: Original packet: [1191] 16030304a2020000510303222dc33f49c88e935387f9e2fd91ed3277224102be...
server: Filtered packet: [1192] 16030304a3020000510303222dc33f49c88e935387f9e2fd91ed3277224102be...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
client: Handshake failed with error -8182: Peer's certificate has an invalid signature.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/35 (61 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 74
client: Readable
client: Handshake
handshake old: [258] 0100a04b47aa88b44c3af527782d67238f247b42911f6c3df11db790390c4588...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 100001020100a04b47aa88b44c3af527782d67238f247b42911f6c3df11db790...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [326] 1603010106100001020100a04b47aa88b44c3af527782d67238f247b42911f6c...
client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 72
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/0 (110 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/1
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
handshake old: [258] 01003bbf1f66c1a7bd9c8a74f1a9da30cae969bafe728ea8d7ff0c176eb092dc...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 1000010201003bbf1f66c1a7bd9c8a74f1a9da30cae969bafe728ea8d7ff0c17...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [326] 16030101061000010201003bbf1f66c1a7bd9c8a74f1a9da30cae969bafe728e...
client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/1 (110 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 73
client: Readable
client: Handshake
handshake old: [258] 01009c3f05396ce170685fdcfad0530df700f0c20236f9bc61b678bf5c2d480c...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 1000010201009c3f05396ce170685fdcfad0530df700f0c20236f9bc61b678bf...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [326] 16030101061000010201009c3f05396ce170685fdcfad0530df700f0c20236f9...
client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/2 (111 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/3
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
handshake old: [258] 01002758b90fc3544799ed2bc135c9c733da0c487aa2d269c54f11ff3affdb93...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 1000010201002758b90fc3544799ed2bc135c9c733da0c487aa2d269c54f11ff...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [326] 16030101061000010201002758b90fc3544799ed2bc135c9c733da0c487aa2d2...
client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 71
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/3 (111 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/4
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 72
client: Readable
client: Handshake
handshake old: [258] 01004deaa0fe1027528ed3896ecaf9569763ba85c1557b56f27e260de65be429...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [262] 1000010201004deaa0fe1027528ed3896ecaf9569763ba85c1557b56f27e260d...
record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9...
client: Original packet: [326] 16030101061000010201004deaa0fe1027528ed3896ecaf9569763ba85c1557b...
client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 70
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/4 (110 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/5
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 71
client: Readable
client: Handshake
handshake old: [258] 0100d9e925bcf9578538fe0e718c91af6561d36a06092fe790ee7fbdf4e26b53...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [262] 100001020100d9e925bcf9578538fe0e718c91af6561d36a06092fe790ee7fbd...
record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9...
client: Original packet: [326] 1603010106100001020100d9e925bcf9578538fe0e718c91af6561d36a06092f...
client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 69
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/5 (112 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/6
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 70
client: Readable
client: Handshake
handshake old: [258] 010010df6c8f884cc834432686ee7c742b823a9d922ae6bd272e8b489ddc3597...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [262] 10000102010010df6c8f884cc834432686ee7c742b823a9d922ae6bd272e8b48...
record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [326] 160301010610000102010010df6c8f884cc834432686ee7c742b823a9d922ae6...
client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 69
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/6 (115 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/7
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 70
client: Readable
client: Handshake
handshake old: [258] 01008e29fb7baff70d64bf3640844ba156ea88ee21481f526cb484e095ac0cd5...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [262] 1000010201008e29fb7baff70d64bf3640844ba156ea88ee21481f526cb484e0...
record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [326] 16030101061000010201008e29fb7baff70d64bf3640844ba156ea88ee21481f...
client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 69
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/7 (111 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/8
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 70
client: Readable
client: Handshake
handshake old: [258] 0100cf1429abc3c13407f253301b79310032ab9ab0b04dcaec8ec1d79c486226...
handshake new: [259] 010101cf1429abc3c13407f253301b79310032ab9ab0b04dcaec8ec1d79c4862...
record old: [262] 100001020100cf1429abc3c13407f253301b79310032ab9ab0b04dcaec8ec1d7...
record new: [263] 10000103010101cf1429abc3c13407f253301b79310032ab9ab0b04dcaec8ec1...
client: Original packet: [326] 1603010106100001020100cf1429abc3c13407f253301b79310032ab9ab0b04d...
client: Filtered packet: [327] 160301010710000103010101cf1429abc3c13407f253301b79310032ab9ab0b0...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 68
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/8 (111 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/9
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 69
client: Readable
client: Handshake
handshake old: [258] 010016db65f99a04ef71f801675db5b4bb815ea26d9a736293a8c723dd21f8e2...
handshake new: [259] 01010116db65f99a04ef71f801675db5b4bb815ea26d9a736293a8c723dd21f8...
record old: [262] 10000102010016db65f99a04ef71f801675db5b4bb815ea26d9a736293a8c723...
record new: [263] 1000010301010116db65f99a04ef71f801675db5b4bb815ea26d9a736293a8c7...
client: Original packet: [326] 160301010610000102010016db65f99a04ef71f801675db5b4bb815ea26d9a73...
client: Filtered packet: [327] 16030101071000010301010116db65f99a04ef71f801675db5b4bb815ea26d9a...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 67
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/9 (111 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/10
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 68
client: Readable
client: Handshake
handshake old: [258] 0100cc0365b71753effc4674641bc0b978a08aa205f140d895fc1ffcafc2a7fe...
handshake new: [259] 010100cc0365b71753effc4674641bc0b978a08aa205f140d895fc1ffcafc2a7...
record old: [262] 100001020100cc0365b71753effc4674641bc0b978a08aa205f140d895fc1ffc...
record new: [263] 10000103010100cc0365b71753effc4674641bc0b978a08aa205f140d895fc1f...
client: Original packet: [326] 1603010106100001020100cc0365b71753effc4674641bc0b978a08aa205f140...
client: Filtered packet: [327] 160301010710000103010100cc0365b71753effc4674641bc0b978a08aa205f1...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 66
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/10 (137 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/11
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 67
client: Readable
client: Handshake
handshake old: [258] 01002ff773302f83273cb04df7002f733049f6321a26c5a4fd2dd5447286e148...
handshake new: [259] 0101002ff773302f83273cb04df7002f733049f6321a26c5a4fd2dd5447286e1...
record old: [262] 1000010201002ff773302f83273cb04df7002f733049f6321a26c5a4fd2dd544...
record new: [263] 100001030101002ff773302f83273cb04df7002f733049f6321a26c5a4fd2dd5...
client: Original packet: [326] 16030101061000010201002ff773302f83273cb04df7002f733049f6321a26c5...
client: Filtered packet: [327] 1603010107100001030101002ff773302f83273cb04df7002f733049f6321a26...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 65
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/11 (137 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/12
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 66
client: Readable
client: Handshake
handshake old: [258] 0100df8ca7a197ce7e23044750f4f6936d39361aab29dc1852c3c658ac7e664f...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 100001020100df8ca7a197ce7e23044750f4f6936d39361aab29dc1852c3c658...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [342] 1603020106100001020100df8ca7a197ce7e23044750f4f6936d39361aab29dc...
client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 64
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/12 (123 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/13
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 65
client: Readable
client: Handshake
handshake old: [258] 010078274707d2770f12482886b148999e4a350d01be83a66d254d7284deca7e...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 10000102010078274707d2770f12482886b148999e4a350d01be83a66d254d72...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [342] 160302010610000102010078274707d2770f12482886b148999e4a350d01be83...
client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 63
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/13 (123 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/14
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 64
client: Readable
client: Handshake
handshake old: [258] 01000797ec79b9092d16d8d08bd1cd268b0dc448d3981af088b9ec8ed3bd7af9...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 1000010201000797ec79b9092d16d8d08bd1cd268b0dc448d3981af088b9ec8e...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [342] 16030201061000010201000797ec79b9092d16d8d08bd1cd268b0dc448d3981a...
client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 63
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/14 (118 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/15
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 64
client: Readable
client: Handshake
handshake old: [258] 0100bbddeb747971ab7d4c6b522b908bfe5a160cc8f421acb3e587659b055708...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 100001020100bbddeb747971ab7d4c6b522b908bfe5a160cc8f421acb3e58765...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [342] 1603020106100001020100bbddeb747971ab7d4c6b522b908bfe5a160cc8f421...
client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 62
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/15 (119 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/16
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 63
client: Readable
client: Handshake
handshake old: [258] 0100befbf231af48360bdb34716cb12c58c8e3a858c3bad5fa482a08fdc322e3...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [262] 100001020100befbf231af48360bdb34716cb12c58c8e3a858c3bad5fa482a08...
record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9...
client: Original packet: [342] 1603020106100001020100befbf231af48360bdb34716cb12c58c8e3a858c3ba...
client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 62
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/16 (125 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/17
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 63
client: Readable
client: Handshake
handshake old: [258] 010093b7d4526ab0f6bc3048f75c300ed3e1681581f30a668e2a7294e0c22349...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [262] 10000102010093b7d4526ab0f6bc3048f75c300ed3e1681581f30a668e2a7294...
record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9...
client: Original packet: [342] 160302010610000102010093b7d4526ab0f6bc3048f75c300ed3e1681581f30a...
client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 61
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/17 (111 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/18
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 62
client: Readable
client: Handshake
handshake old: [258] 0100072a1427fc02509f786914584a7c58bfd82ccdb628c49bbe34285eff7376...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [262] 100001020100072a1427fc02509f786914584a7c58bfd82ccdb628c49bbe3428...
record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [342] 1603020106100001020100072a1427fc02509f786914584a7c58bfd82ccdb628...
client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 60
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/18 (124 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/19
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 61
client: Readable
client: Handshake
handshake old: [258] 0100aef28e6985327252bd40dd729fc7b5cc5f52b9fb7a99ae210aa1ab696be8...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [262] 100001020100aef28e6985327252bd40dd729fc7b5cc5f52b9fb7a99ae210aa1...
record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [342] 1603020106100001020100aef28e6985327252bd40dd729fc7b5cc5f52b9fb7a...
client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 59
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/19 (126 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/20
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 60
client: Readable
client: Handshake
handshake old: [258] 01006ef3762d97a27d1c4e2cbe8102a594f91ffd2beec9a6fa5cd5cd41416faa...
handshake new: [259] 0101016ef3762d97a27d1c4e2cbe8102a594f91ffd2beec9a6fa5cd5cd41416f...
record old: [262] 1000010201006ef3762d97a27d1c4e2cbe8102a594f91ffd2beec9a6fa5cd5cd...
record new: [263] 100001030101016ef3762d97a27d1c4e2cbe8102a594f91ffd2beec9a6fa5cd5...
client: Original packet: [342] 16030201061000010201006ef3762d97a27d1c4e2cbe8102a594f91ffd2beec9...
client: Filtered packet: [343] 1603020107100001030101016ef3762d97a27d1c4e2cbe8102a594f91ffd2bee...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 59
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/20 (125 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/21
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 60
client: Readable
client: Handshake
handshake old: [258] 010076be1fc30f3703eb11b00f8a7b4ed932116e62c741c6f7b4206592387acb...
handshake new: [259] 01010176be1fc30f3703eb11b00f8a7b4ed932116e62c741c6f7b4206592387a...
record old: [262] 10000102010076be1fc30f3703eb11b00f8a7b4ed932116e62c741c6f7b42065...
record new: [263] 1000010301010176be1fc30f3703eb11b00f8a7b4ed932116e62c741c6f7b420...
client: Original packet: [342] 160302010610000102010076be1fc30f3703eb11b00f8a7b4ed932116e62c741...
client: Filtered packet: [343] 16030201071000010301010176be1fc30f3703eb11b00f8a7b4ed932116e62c7...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 58
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/21 (111 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/22
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 59
client: Readable
client: Handshake
handshake old: [258] 0100435da2a9677a0327b64fda49dd80a94c539dedb06ffa09ee0aa86bfb4944...
handshake new: [259] 010100435da2a9677a0327b64fda49dd80a94c539dedb06ffa09ee0aa86bfb49...
record old: [262] 100001020100435da2a9677a0327b64fda49dd80a94c539dedb06ffa09ee0aa8...
record new: [263] 10000103010100435da2a9677a0327b64fda49dd80a94c539dedb06ffa09ee0a...
client: Original packet: [342] 1603020106100001020100435da2a9677a0327b64fda49dd80a94c539dedb06f...
client: Filtered packet: [343] 160302010710000103010100435da2a9677a0327b64fda49dd80a94c539dedb0...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 58
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/22 (149 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/23
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 58
client: Readable
client: Handshake
handshake old: [258] 01002183125eeb1a055073eae1f1db121cb5744bf14c4299d434dd8f4006a292...
handshake new: [259] 0101002183125eeb1a055073eae1f1db121cb5744bf14c4299d434dd8f4006a2...
record old: [262] 1000010201002183125eeb1a055073eae1f1db121cb5744bf14c4299d434dd8f...
record new: [263] 100001030101002183125eeb1a055073eae1f1db121cb5744bf14c4299d434dd...
client: Original packet: [342] 16030201061000010201002183125eeb1a055073eae1f1db121cb5744bf14c42...
client: Filtered packet: [343] 1603020107100001030101002183125eeb1a055073eae1f1db121cb5744bf14c...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 57
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/23 (137 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/24
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 57
client: Readable
client: Handshake
handshake old: [258] 01000f1fa1879ebf37bb23662e0bef7e6576e9102c9eb99faa7482f365a04356...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 1000010201000f1fa1879ebf37bb23662e0bef7e6576e9102c9eb99faa7482f3...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [318] 16030301061000010201000f1fa1879ebf37bb23662e0bef7e6576e9102c9eb9...
client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 56
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/24 (121 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/25
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 57
client: Readable
client: Handshake
handshake old: [258] 0100923ca9eac00c5bc3ce50335bac6d882af99cab1c218f112c06fc70984fa0...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 100001020100923ca9eac00c5bc3ce50335bac6d882af99cab1c218f112c06fc...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [318] 1603030106100001020100923ca9eac00c5bc3ce50335bac6d882af99cab1c21...
client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 55
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/25 (125 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/26
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 56
client: Readable
client: Handshake
handshake old: [258] 010031cbaf1ff38fab164c368f4e9073dadce3375e439b80112e96fe2dc056f8...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 10000102010031cbaf1ff38fab164c368f4e9073dadce3375e439b80112e96fe...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [318] 160303010610000102010031cbaf1ff38fab164c368f4e9073dadce3375e439b...
client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 54
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/26 (113 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/27
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 01004715d3e278bde7121fc859ddfe3826a88adff00990c73526c0bf00ed60c6...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [262] 1000010201004715d3e278bde7121fc859ddfe3826a88adff00990c73526c0bf...
record new: [262] 1000010201000000000000000000000000000000000000000000000000000000...
client: Original packet: [318] 16030301061000010201004715d3e278bde7121fc859ddfe3826a88adff00990...
client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 53
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/27 (123 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/28
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 54
client: Readable
client: Handshake
handshake old: [258] 010082de000744038c3b8323940251ea8c9a94f7255384a5f69e3fea0214d52f...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [262] 10000102010082de000744038c3b8323940251ea8c9a94f7255384a5f69e3fea...
record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9...
client: Original packet: [318] 160303010610000102010082de000744038c3b8323940251ea8c9a94f7255384...
client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 53
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/28 (121 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/29
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 54
client: Readable
client: Handshake
handshake old: [258] 01007aad59a4a93b8449b0439f2b4a58f885a46bdaf29edc1f54139667c1b7a0...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [262] 1000010201007aad59a4a93b8449b0439f2b4a58f885a46bdaf29edc1f541396...
record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9...
client: Original packet: [318] 16030301061000010201007aad59a4a93b8449b0439f2b4a58f885a46bdaf29e...
client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 52
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/29 (121 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/30
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 53
client: Readable
client: Handshake
handshake old: [258] 0100be3d8b491e9a0d5d010519301dd8b1cdf70d3d07135507a7dd0c9e0585e8...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [262] 100001020100be3d8b491e9a0d5d010519301dd8b1cdf70d3d07135507a7dd0c...
record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [318] 1603030106100001020100be3d8b491e9a0d5d010519301dd8b1cdf70d3d0713...
client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 51
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/30 (111 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/31
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
handshake old: [258] 010027df85e9a33571179547b47256ff7552aceca5de1b72a55618a64cb8772f...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [262] 10000102010027df85e9a33571179547b47256ff7552aceca5de1b72a55618a6...
record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [318] 160303010610000102010027df85e9a33571179547b47256ff7552aceca5de1b...
client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 50
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/31 (121 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/32
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 51
client: Readable
client: Handshake
handshake old: [258] 01002b0c454d2b37727b79cdbb49536361c1f1b039da194c1ddf9f392ccb04fb...
handshake new: [259] 0101012b0c454d2b37727b79cdbb49536361c1f1b039da194c1ddf9f392ccb04...
record old: [262] 1000010201002b0c454d2b37727b79cdbb49536361c1f1b039da194c1ddf9f39...
record new: [263] 100001030101012b0c454d2b37727b79cdbb49536361c1f1b039da194c1ddf9f...
client: Original packet: [318] 16030301061000010201002b0c454d2b37727b79cdbb49536361c1f1b039da19...
client: Filtered packet: [319] 1603030107100001030101012b0c454d2b37727b79cdbb49536361c1f1b039da...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 50
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/32 (121 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/33
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 51
client: Readable
client: Handshake
handshake old: [258] 01006991357aeb6c36f8cc05bcc7bc998d2e020a310ade896e737f59d2b58d3e...
handshake new: [259] 0101016991357aeb6c36f8cc05bcc7bc998d2e020a310ade896e737f59d2b58d...
record old: [262] 1000010201006991357aeb6c36f8cc05bcc7bc998d2e020a310ade896e737f59...
record new: [263] 100001030101016991357aeb6c36f8cc05bcc7bc998d2e020a310ade896e737f...
client: Original packet: [318] 16030301061000010201006991357aeb6c36f8cc05bcc7bc998d2e020a310ade...
client: Filtered packet: [319] 1603030107100001030101016991357aeb6c36f8cc05bcc7bc998d2e020a310a...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 49
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/33 (113 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/34
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 50
client: Readable
client: Handshake
handshake old: [258] 010087c46009d7ba18ceb6184fbdfc5b977768d4c7f92f2f30dc8665f7487b3d...
handshake new: [259] 01010087c46009d7ba18ceb6184fbdfc5b977768d4c7f92f2f30dc8665f7487b...
record old: [262] 10000102010087c46009d7ba18ceb6184fbdfc5b977768d4c7f92f2f30dc8665...
record new: [263] 1000010301010087c46009d7ba18ceb6184fbdfc5b977768d4c7f92f2f30dc86...
client: Original packet: [318] 160303010610000102010087c46009d7ba18ceb6184fbdfc5b977768d4c7f92f...
client: Filtered packet: [319] 16030301071000010301010087c46009d7ba18ceb6184fbdfc5b977768d4c7f9...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 48
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/34 (150 ms)
[ RUN      ] DamageYStream/TlsDamageDHYTest.DamageClientY/35
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 49
client: Readable
client: Handshake
handshake old: [258] 01007e44c1b1ae8838710a34828e925e5205eb43ce5a9816fb6a039646def271...
handshake new: [259] 0101007e44c1b1ae8838710a34828e925e5205eb43ce5a9816fb6a039646def2...
record old: [262] 1000010201007e44c1b1ae8838710a34828e925e5205eb43ce5a9816fb6a0396...
record new: [263] 100001030101007e44c1b1ae8838710a34828e925e5205eb43ce5a9816fb6a03...
client: Original packet: [318] 16030301061000010201007e44c1b1ae8838710a34828e925e5205eb43ce5a98...
client: Filtered packet: [319] 1603030107100001030101007e44c1b1ae8838710a34828e925e5205eb43ce5a...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 47
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/35 (137 ms)
[----------] 72 tests from DamageYStream/TlsDamageDHYTest (6769 ms total)

[----------] 48 tests from DamageYDatagram/TlsDamageDHYTest
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffca5c50c205...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feffca5c50c205...
server: Would have blocked
Poll() waiters = 2 timers = 50
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 49
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0 (69 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffa8a2903e1e...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feffa8a2903e1e...
server: Would have blocked
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1 (71 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff606422f043...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff606422f043...
server: Would have blocked
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2 (72 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff655dab5c44...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff655dab5c44...
server: Would have blocked
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 49
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3 (61 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffe7dec367d4...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feffe7dec367d4...
server: Would have blocked
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4 (60 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffa4b8cd5403...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feffa4b8cd5403...
server: Would have blocked
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 48
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5 (71 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff36b18d365f...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff36b18d365f...
server: Would have blocked
Poll() waiters = 2 timers = 51
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 48
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6 (60 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffa9ac8c1bff...
server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feffa9ac8c1bff...
server: Would have blocked
Poll() waiters = 2 timers = 51
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7 (70 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffae6fecdee2...
server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feffae6fecdee2...
server: Would have blocked
Poll() waiters = 2 timers = 51
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8 (60 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff6a18ba0bf4...
server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feff6a18ba0bf4...
server: Would have blocked
Poll() waiters = 2 timers = 51
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9 (70 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffacca618a03...
server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feffacca618a03...
server: Would have blocked
Poll() waiters = 2 timers = 51
client: Readable
client: Handshake
client: Handshake failed with error -8023: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10 (71 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff6afc0d37ea...
server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feff6afc0d37ea...
server: Would have blocked
Poll() waiters = 2 timers = 51
client: Readable
client: Handshake
client: Handshake failed with error -8023: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 49
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11 (64 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd3bab3cdca0...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd3bab3cdca0...
server: Would have blocked
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12 (71 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdb2f5f58add...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdb2f5f58add...
server: Would have blocked
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 49
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13 (59 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd0739b74f82...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd0739b74f82...
server: Would have blocked
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 50
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14 (71 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd6cf9ecf474...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd6cf9ecf474...
server: Would have blocked
Poll() waiters = 2 timers = 53
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15 (61 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdd953c5334e...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdd953c5334e...
server: Would have blocked
Poll() waiters = 2 timers = 53
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 51
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16 (68 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd4958780e2b...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd4958780e2b...
server: Would have blocked
Poll() waiters = 2 timers = 54
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 51
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17 (69 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd3a96ea1b42...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd3a96ea1b42...
server: Would have blocked
Poll() waiters = 2 timers = 54
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18 (72 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd182a32f097...
server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd182a32f097...
server: Would have blocked
Poll() waiters = 2 timers = 54
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 52
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19 (72 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdd43d9ff6e3...
server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefdd43d9ff6e3...
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20 (64 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd8bd589e1d7...
server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd8bd589e1d7...
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
client: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 52
server: Readable
server: Handshake
server: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21 (71 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdbcb487b558...
server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefdbcb487b558...
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
client: Handshake failed with error -8182: Peer's certificate has an invalid signature.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22 (73 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc...
record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc...
server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd9808b34e10...
server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd9808b34e10...
server: Would have blocked
Poll() waiters = 2 timers = 56
client: Readable
client: Handshake
client: Handshake failed with error -8182: Peer's certificate has an invalid signature.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 53
server: Readable
server: Handshake
server: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
server: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23 (64 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 56
client: Readable
client: Handshake
handshake old: [258] 0100de5e34945bf1f40f39fe16572307eec667d2a5f2de52206a010e0bc3d833...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [270] 1000010200010000000001020100de5e34945bf1f40f39fe16572307eec667d2...
record new: [270] 1000010200010000000001020100000000000000000000000000000000000000...
client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100de5e34945b...
client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0 (122 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 01000cd629f164244501628a36fde824d8712a2f7c5cd4860d218cd58b09a403...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [270] 10000102000100000000010201000cd629f164244501628a36fde824d8712a2f...
record new: [270] 1000010200010000000001020100000000000000000000000000000000000000...
client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201000cd629f164...
client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1 (114 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 01008f5b2d90c979659468bf6477616f7161d70365e8a38f9b27e9f457f8522f...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [270] 10000102000100000000010201008f5b2d90c979659468bf6477616f7161d703...
record new: [270] 1000010200010000000001020100000000000000000000000000000000000000...
client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201008f5b2d90c9...
client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
server: Readable
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2 (124 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 01006d8dcc54341d09d983831f282c1da8a156d6c8206966126ac60656d11cd1...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [270] 10000102000100000000010201006d8dcc54341d09d983831f282c1da8a156d6...
record new: [270] 1000010200010000000001020100000000000000000000000000000000000000...
client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201006d8dcc5434...
client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3 (125 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 010038db03d95e76dad38e66c50b8bc79fde9458b61b7068fd4903e535199945...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [270] 100001020001000000000102010038db03d95e76dad38e66c50b8bc79fde9458...
record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc...
client: Original packet: [374] 16feff0000000000000001010e100001020001000000000102010038db03d95e...
client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4 (111 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 0100628023b89be7e91f784e920d71ffce374b0cfdc8ab03c0b40a7ebbf43864...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [270] 1000010200010000000001020100628023b89be7e91f784e920d71ffce374b0c...
record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc...
client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100628023b89b...
client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5 (123 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 010064ea282ab845a5f3b742f2e47f2042ba008eaaf3ad5c11dd657b1293b527...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [270] 100001020001000000000102010064ea282ab845a5f3b742f2e47f2042ba008e...
record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff...
client: Original packet: [374] 16feff0000000000000001010e100001020001000000000102010064ea282ab8...
client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6 (123 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 010063c838d88f4d210616628a9e9eba706a394d6d497784683827746c148f50...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [270] 100001020001000000000102010063c838d88f4d210616628a9e9eba706a394d...
record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff...
client: Original packet: [374] 16feff0000000000000001010e100001020001000000000102010063c838d88f...
client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
server: Readable
Poll() waiters = 2 timers = 53
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7 (111 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 56
client: Readable
client: Handshake
handshake old: [258] 0100d589b50fa28f154497ef0c7237adf9d34af3a48d2f95b00e792d3d7045c0...
handshake new: [259] 010101d589b50fa28f154497ef0c7237adf9d34af3a48d2f95b00e792d3d7045...
record old: [270] 1000010200010000000001020100d589b50fa28f154497ef0c7237adf9d34af3...
record new: [271] 100001030001000000000103010101d589b50fa28f154497ef0c7237adf9d34a...
client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100d589b50fa2...
client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010101d589b50f...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
server: Readable
Poll() waiters = 2 timers = 53
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8 (122 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 56
client: Readable
client: Handshake
handshake old: [258] 010084799ae75a4f5fc9685b6bf99ce73edd3bd511d59f6d32ecdf6f8d82e00e...
handshake new: [259] 01010184799ae75a4f5fc9685b6bf99ce73edd3bd511d59f6d32ecdf6f8d82e0...
record old: [270] 100001020001000000000102010084799ae75a4f5fc9685b6bf99ce73edd3bd5...
record new: [271] 10000103000100000000010301010184799ae75a4f5fc9685b6bf99ce73edd3b...
client: Original packet: [374] 16feff0000000000000001010e100001020001000000000102010084799ae75a...
client: Filtered packet: [375] 16feff0000000000000001010f10000103000100000000010301010184799ae7...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9 (123 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 0100c01c8edda37b03486ff9028366b5aa66dcd24c8c05d379f704ac3274a8d3...
handshake new: [259] 010100c01c8edda37b03486ff9028366b5aa66dcd24c8c05d379f704ac3274a8...
record old: [270] 1000010200010000000001020100c01c8edda37b03486ff9028366b5aa66dcd2...
record new: [271] 100001030001000000000103010100c01c8edda37b03486ff9028366b5aa66dc...
client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100c01c8edda3...
client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010100c01c8edd...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 53
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10 (140 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 01007b1103231b6f39c1614847858e9e2aee179196884581409a2e8944ac9bc1...
handshake new: [259] 0101007b1103231b6f39c1614847858e9e2aee179196884581409a2e8944ac9b...
record old: [270] 10000102000100000000010201007b1103231b6f39c1614847858e9e2aee1791...
record new: [271] 1000010300010000000001030101007b1103231b6f39c1614847858e9e2aee17...
client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201007b1103231b...
client: Filtered packet: [375] 16feff0000000000000001010f1000010300010000000001030101007b110323...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
server: Readable
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11 (154 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 0100ecdf6891dcb29b8be3fc880e510e05678fa14f3632d5cad44ad8decc8d58...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [270] 1000010200010000000001020100ecdf6891dcb29b8be3fc880e510e05678fa1...
record new: [270] 1000010200010000000001020100000000000000000000000000000000000000...
client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ecdf6891dc...
client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12 (111 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 010057413759f25441ee50a06a30bb2e34e7171ea9e06b30ea24084377c09089...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [270] 100001020001000000000102010057413759f25441ee50a06a30bb2e34e7171e...
record new: [270] 1000010200010000000001020100000000000000000000000000000000000000...
client: Original packet: [358] 16fefd0000000000000001010e100001020001000000000102010057413759f2...
client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13 (124 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 0100a06a6f7b68ddf9bd0dd9236e2f00f8782864b14ea656599d48ea5f9a73c9...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [270] 1000010200010000000001020100a06a6f7b68ddf9bd0dd9236e2f00f8782864...
record new: [270] 1000010200010000000001020100000000000000000000000000000000000000...
client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100a06a6f7b68...
client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14 (124 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 0100b94063d728537928535776b855b945c3716850c8ee8188857f455024dd0e...
handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000...
record old: [270] 1000010200010000000001020100b94063d728537928535776b855b945c37168...
record new: [270] 1000010200010000000001020100000000000000000000000000000000000000...
client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100b94063d728...
client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15 (121 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 010071d9317edcca6ca78ed8a219861ace7f9d85123d6f3f3b90c68e41ed4f01...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [270] 100001020001000000000102010071d9317edcca6ca78ed8a219861ace7f9d85...
record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc...
client: Original packet: [358] 16fefd0000000000000001010e100001020001000000000102010071d9317edc...
client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
server: Readable
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16 (124 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 01002a0a0181cddc4b45842603a96e48200ab8dc74a0e4cac127f1cf35da6d83...
handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d...
record old: [270] 10000102000100000000010201002a0a0181cddc4b45842603a96e48200ab8dc...
record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc...
client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201002a0a0181cd...
client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17 (123 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 01008d38864c39e8c31c65a67c562714ca5fdb259eb7ef4de8db0d9485a79032...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [270] 10000102000100000000010201008d38864c39e8c31c65a67c562714ca5fdb25...
record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff...
client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201008d38864c39...
client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
server: Readable
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18 (122 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 0100b3048f6f72a4dd05a33807d9a38b9762a941cf3e2357782146cf18161783...
handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [270] 1000010200010000000001020100b3048f6f72a4dd05a33807d9a38b9762a941...
record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff...
client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100b3048f6f72...
client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19 (114 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 0100b2ee0ce7e34af9942b4d3a95d524343b52b380cebeb9610abc5d9d475348...
handshake new: [259] 010101b2ee0ce7e34af9942b4d3a95d524343b52b380cebeb9610abc5d9d4753...
record old: [270] 1000010200010000000001020100b2ee0ce7e34af9942b4d3a95d524343b52b3...
record new: [271] 100001030001000000000103010101b2ee0ce7e34af9942b4d3a95d524343b52...
client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100b2ee0ce7e3...
client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010101b2ee0ce7...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20 (124 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 0100290726e00fa0c22d2158ec1da0d4e3d193b61b4ad4f57c4cbd6c10a835f0...
handshake new: [259] 010101290726e00fa0c22d2158ec1da0d4e3d193b61b4ad4f57c4cbd6c10a835...
record old: [270] 1000010200010000000001020100290726e00fa0c22d2158ec1da0d4e3d193b6...
record new: [271] 100001030001000000000103010101290726e00fa0c22d2158ec1da0d4e3d193...
client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100290726e00f...
client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010101290726e0...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 141: SSL received a malformed DHE key share handshake extension.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 61: SSL peer was unable to negotiate an acceptable set of security parameters.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21 (124 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 01002f69c181c0ea3758cca7c5693d01c0f0897a0f39d27b67d1bd13fd6db988...
handshake new: [259] 0101002f69c181c0ea3758cca7c5693d01c0f0897a0f39d27b67d1bd13fd6db9...
record old: [270] 10000102000100000000010201002f69c181c0ea3758cca7c5693d01c0f0897a...
record new: [271] 1000010300010000000001030101002f69c181c0ea3758cca7c5693d01c0f089...
client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201002f69c181c0...
client: Filtered packet: [359] 16fefd0000000000000001010f1000010300010000000001030101002f69c181...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
server: Readable
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22 (147 ms)
[ RUN      ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
handshake old: [258] 0100c2e00023058474a82371f9d6661b2e5bcbc99d1badb53af996829db83abf...
handshake new: [259] 010100c2e00023058474a82371f9d6661b2e5bcbc99d1badb53af996829db83a...
record old: [270] 1000010200010000000001020100c2e00023058474a82371f9d6661b2e5bcbc9...
record new: [271] 100001030001000000000103010100c2e00023058474a82371f9d6661b2e5bcb...
client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100c2e0002305...
client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010100c2e00023...
client: Would have blocked
server: Readable
server: Handshake
server: Handshake failed with SSL error 87: Received incorrect handshakes hash values from peer.
server: Changing state from CONNECTING to ERROR
server: Readable
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 96: Peer reports failure of signature verification or key exchange.
client: Changing state from CONNECTING to ERROR
[       OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23 (151 ms)
[----------] 48 tests from DamageYDatagram/TlsDamageDHYTest (4621 ms total)

[----------] 20 tests from DatagramOnly/TlsConnectDatagram
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropClientFirstFlightOnce/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Droppped packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd5c35694ef7...
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 52
server: Readable
server: Handshake
server: Would have blocked
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 54
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 55
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.DropClientFirstFlightOnce/0 (123 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropClientFirstFlightOnce/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Droppped packet: [131] 16feff000000000000000000760100006a000000000000006afeff8df815aa6c...
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 57
Poll() waiters = 2 timers = 56
Poll() waiters = 2 timers = 55
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 53
server: Readable
server: Handshake
server: Would have blocked
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 55
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 56
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.DropClientFirstFlightOnce/1 (134 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropServerFirstFlightOnce/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Droppped packet: [826] 16fefd00000000000000000063020000570000000000000057fefd8472ca4960...
server: Would have blocked
Poll() waiters = 2 timers = 59
Poll() waiters = 2 timers = 57
Poll() waiters = 2 timers = 56
Poll() waiters = 2 timers = 55
Poll() waiters = 2 timers = 55
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 55
server: Readable
server: Handshake
server: Would have blocked
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 56
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 57
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.DropServerFirstFlightOnce/0 (119 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropServerFirstFlightOnce/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Droppped packet: [824] 16feff00000000000000000063020000570000000000000057feffae8a072ba4...
server: Would have blocked
Poll() waiters = 2 timers = 60
Poll() waiters = 2 timers = 59
Poll() waiters = 2 timers = 59
Poll() waiters = 2 timers = 59
Poll() waiters = 2 timers = 58
Poll() waiters = 2 timers = 58
Poll() waiters = 2 timers = 58
Poll() waiters = 2 timers = 57
Poll() waiters = 2 timers = 56
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 56
server: Readable
server: Handshake
server: Would have blocked
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 57
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 58
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.DropServerFirstFlightOnce/1 (122 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropAllFirstTransmissions/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Droppped packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefddc1ad04ee5...
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 60
Poll() waiters = 2 timers = 58
Poll() waiters = 2 timers = 58
Poll() waiters = 2 timers = 57
Poll() waiters = 2 timers = 57
Poll() waiters = 2 timers = 57
Poll() waiters = 2 timers = 56
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 56
server: Readable
server: Handshake
server: Droppped packet: [826] 16fefd00000000000000000063020000570000000000000057fefdc512b7bf8f...
server: Would have blocked
Poll() waiters = 2 timers = 56
Poll() waiters = 2 timers = 56
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 56
client: Readable
client: Handshake
client: Droppped packet: [166] 16fefd0000000000000002004e100000420001000000000042410430c8364eaf...
client: Would have blocked
Poll() waiters = 2 timers = 56
Poll() waiters = 2 timers = 56
Poll() waiters = 2 timers = 55
Poll() waiters = 2 timers = 55
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 54
server: Readable
server: Handshake
server: Droppped packet: [75] 14fefd000000000000000800010116fefd000100000000000000300001000000...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
Poll() waiters = 2 timers = 54
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 53
Poll() waiters = 2 timers = 52
client: Readable
client: Handshake
client: Droppped packet: [166] 16fefd0000000000000006004e100000420001000000000042410430c8364eaf...
client: Would have blocked
Poll() waiters = 2 timers = 52
Poll() waiters = 2 timers = 51
Poll() waiters = 2 timers = 50
Poll() waiters = 2 timers = 49
Poll() waiters = 2 timers = 49
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 49
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] DatagramOnly/TlsConnectDatagram.DropAllFirstTransmissions/0 (528 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropAllFirstTransmissions/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Droppped packet: [131] 16feff000000000000000000760100006a000000000000006afeff4dc80b70d9...
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 51
Poll() waiters = 2 timers = 50
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 50
server: Readable
server: Handshake
server: Droppped packet: [824] 16feff00000000000000000063020000570000000000000057fefffb92590899...
server: Would have blocked
Poll() waiters = 2 timers = 50
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 50
client: Readable
client: Handshake
client: Droppped packet: [182] 16feff0000000000000002004e10000042000100000000004241045d7c004833...
client: Would have blocked
Poll() waiters = 2 timers = 50
Poll() waiters = 2 timers = 50
Poll() waiters = 2 timers = 49
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 49
server: Readable
server: Handshake
server: Droppped packet: [91] 14feff000000000000000800010116feff0001000000000000004093667d925d...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 48
Poll() waiters = 2 timers = 48
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 47
Poll() waiters = 2 timers = 47
Poll() waiters = 2 timers = 46
Poll() waiters = 2 timers = 46
client: Readable
client: Handshake
client: Droppped packet: [182] 16feff0000000000000006004e10000042000100000000004241045d7c004833...
client: Would have blocked
Poll() waiters = 2 timers = 46
Poll() waiters = 2 timers = 45
Poll() waiters = 2 timers = 44
Poll() waiters = 2 timers = 44
Poll() waiters = 2 timers = 43
Poll() waiters = 2 timers = 43
Poll() waiters = 2 timers = 43
Poll() waiters = 2 timers = 42
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 42
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] DatagramOnly/TlsConnectDatagram.DropAllFirstTransmissions/1 (530 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropServerFirstFlightThrice/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Droppped packet: [826] 16fefd00000000000000000063020000570000000000000057fefda836b9164b...
server: Would have blocked
Poll() waiters = 2 timers = 45
Poll() waiters = 2 timers = 44
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 44
server: Readable
server: Handshake
server: Droppped packet: [826] 16fefd00000000000000040063020000570000000000000057fefda836b9164b...
server: Would have blocked
Poll() waiters = 2 timers = 45
Poll() waiters = 2 timers = 44
Poll() waiters = 2 timers = 44
Poll() waiters = 2 timers = 43
Poll() waiters = 2 timers = 42
Poll() waiters = 2 timers = 42
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 42
server: Readable
server: Handshake
server: Droppped packet: [826] 16fefd00000000000000080063020000570000000000000057fefda836b9164b...
server: Would have blocked
Poll() waiters = 2 timers = 43
Poll() waiters = 2 timers = 42
Poll() waiters = 2 timers = 41
Poll() waiters = 2 timers = 41
Poll() waiters = 2 timers = 40
Poll() waiters = 2 timers = 40
Poll() waiters = 2 timers = 39
Poll() waiters = 2 timers = 39
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 39
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 40
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 39
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] DatagramOnly/TlsConnectDatagram.DropServerFirstFlightThrice/0 (418 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropServerFirstFlightThrice/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Droppped packet: [824] 16feff00000000000000000063020000570000000000000057feff94eda6713c...
server: Would have blocked
Poll() waiters = 2 timers = 42
Poll() waiters = 2 timers = 40
Poll() waiters = 2 timers = 40
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 40
server: Readable
server: Handshake
server: Droppped packet: [824] 16feff00000000000000040063020000570000000000000057feff94eda6713c...
server: Would have blocked
Poll() waiters = 2 timers = 40
Poll() waiters = 2 timers = 40
Poll() waiters = 2 timers = 39
Poll() waiters = 2 timers = 38
Poll() waiters = 2 timers = 38
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 38
server: Readable
server: Handshake
server: Droppped packet: [824] 16feff00000000000000080063020000570000000000000057feff94eda6713c...
server: Would have blocked
Poll() waiters = 2 timers = 39
Poll() waiters = 2 timers = 39
Poll() waiters = 2 timers = 38
Poll() waiters = 2 timers = 37
Poll() waiters = 2 timers = 36
Poll() waiters = 2 timers = 36
Poll() waiters = 2 timers = 35
Poll() waiters = 2 timers = 33
Poll() waiters = 2 timers = 33
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 33
server: Readable
server: Handshake
server: Would have blocked
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 33
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] DatagramOnly/TlsConnectDatagram.DropServerFirstFlightThrice/1 (422 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropClientSecondFlightOnce/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 36
client: Readable
client: Handshake
client: Droppped packet: [166] 16fefd0000000000000001004e1000004200010000000000424104ed7b9e2092...
client: Would have blocked
Poll() waiters = 2 timers = 35
Poll() waiters = 2 timers = 35
Poll() waiters = 2 timers = 35
Poll() waiters = 2 timers = 34
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 34
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 34
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] DatagramOnly/TlsConnectDatagram.DropClientSecondFlightOnce/0 (108 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropClientSecondFlightOnce/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 37
client: Readable
client: Handshake
client: Droppped packet: [182] 16feff0000000000000001004e1000004200010000000000424104ee7603a6fe...
client: Would have blocked
Poll() waiters = 2 timers = 36
Poll() waiters = 2 timers = 36
Poll() waiters = 2 timers = 36
Poll() waiters = 2 timers = 35
Poll() waiters = 2 timers = 35
Poll() waiters = 2 timers = 34
Poll() waiters = 2 timers = 34
Poll() waiters = 2 timers = 34
Poll() waiters = 2 timers = 33
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 33
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 34
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] DatagramOnly/TlsConnectDatagram.DropClientSecondFlightOnce/1 (107 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropClientSecondFlightThrice/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 37
client: Readable
client: Handshake
client: Droppped packet: [166] 16fefd0000000000000001004e10000042000100000000004241040222f2618a...
client: Would have blocked
Poll() waiters = 2 timers = 36
Poll() waiters = 2 timers = 35
Poll() waiters = 2 timers = 35
Poll() waiters = 2 timers = 34
Poll() waiters = 2 timers = 34
Poll() waiters = 2 timers = 34
Poll() waiters = 2 timers = 33
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 33
client: Readable
client: Handshake
client: Droppped packet: [166] 16fefd0000000000000003004e10000042000100000000004241040222f2618a...
client: Would have blocked
Poll() waiters = 2 timers = 34
Poll() waiters = 2 timers = 34
Poll() waiters = 2 timers = 33
Poll() waiters = 2 timers = 33
Poll() waiters = 2 timers = 32
Poll() waiters = 2 timers = 32
Poll() waiters = 2 timers = 31
Poll() waiters = 2 timers = 30
Poll() waiters = 2 timers = 30
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 30
client: Readable
client: Handshake
client: Droppped packet: [166] 16fefd0000000000000005004e10000042000100000000004241040222f2618a...
client: Would have blocked
Poll() waiters = 2 timers = 31
Poll() waiters = 2 timers = 30
Poll() waiters = 2 timers = 29
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 29
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 29
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] DatagramOnly/TlsConnectDatagram.DropClientSecondFlightThrice/0 (409 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropClientSecondFlightThrice/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 31
client: Readable
client: Handshake
client: Droppped packet: [182] 16feff0000000000000001004e10000042000100000000004241045736bd0932...
client: Would have blocked
Poll() waiters = 2 timers = 32
Poll() waiters = 2 timers = 31
Poll() waiters = 2 timers = 31
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 31
client: Readable
client: Handshake
client: Droppped packet: [182] 16feff0000000000000003004e10000042000100000000004241045736bd0932...
client: Would have blocked
Poll() waiters = 2 timers = 32
Poll() waiters = 2 timers = 31
Poll() waiters = 2 timers = 30
Poll() waiters = 2 timers = 30
Poll() waiters = 2 timers = 30
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 30
client: Readable
client: Handshake
client: Droppped packet: [182] 16feff0000000000000005004e10000042000100000000004241045736bd0932...
client: Would have blocked
Poll() waiters = 2 timers = 31
Poll() waiters = 2 timers = 30
Poll() waiters = 2 timers = 29
Poll() waiters = 2 timers = 28
Poll() waiters = 2 timers = 28
Poll() waiters = 2 timers = 27
Poll() waiters = 2 timers = 26
server: Readable
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 26
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 26
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] DatagramOnly/TlsConnectDatagram.DropClientSecondFlightThrice/1 (412 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropServerSecondFlightThrice/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 29
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Droppped packet: [75] 14fefd000000000000000400010116fefd000100000000000000300001000000...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 29
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 28
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 28
server: Readable
server: Droppped packet: [75] 14fefd000000000000000500010116fefd000100000000000100300001000000...
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 27
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 27
server: Readable
server: Droppped packet: [75] 14fefd000000000000000600010116fefd000100000000000200300001000000...
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 27
Poll() waiters = 2 timers = 26
Poll() waiters = 2 timers = 25
Poll() waiters = 2 timers = 25
Poll() waiters = 2 timers = 24
Poll() waiters = 2 timers = 23
Poll() waiters = 2 timers = 23
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 23
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 23
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] DatagramOnly/TlsConnectDatagram.DropServerSecondFlightThrice/0 (416 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.DropServerSecondFlightThrice/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 26
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 26
server: Readable
server: Handshake
server: Droppped packet: [91] 14feff000000000000000400010116feff000100000000000000400c86dbb1a8...
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 25
Poll() waiters = 2 timers = 25
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 24
Poll() waiters = 2 timers = 24
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 24
server: Readable
server: Droppped packet: [91] 14feff000000000000000500010116feff000100000000000100403ef742038e...
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 24
Poll() waiters = 2 timers = 23
Poll() waiters = 2 timers = 23
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 23
server: Readable
server: Droppped packet: [91] 14feff000000000000000600010116feff00010000000000020040d454e1d280...
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
Poll() waiters = 2 timers = 23
Poll() waiters = 2 timers = 23
Poll() waiters = 2 timers = 22
Poll() waiters = 2 timers = 22
Poll() waiters = 2 timers = 21
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 21
server: Readable
server: ReadBytes -1
server: Read error -5998: The operation would have blocked
server: Re-arming
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] DatagramOnly/TlsConnectDatagram.DropServerSecondFlightThrice/1 (417 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 24
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 23
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 24
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/0 (84 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 27
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 25
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 25
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/1 (82 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.ShortRead/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 28
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 27
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Writing 1200 bytes
Poll() waiters = 2 timers = 28
client: Readable
client: ReadBytes -1
client: Read error -12155: Not enough room in buffer for DTLS record.
client: Re-arming
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 28
server: Readable
server: ReadBytes 50
server: Re-arming
client: Readable
client: ReadBytes 50
client: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.ShortRead/0 (81 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.ShortRead/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 30
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 29
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Writing 1200 bytes
Poll() waiters = 2 timers = 29
client: Readable
client: ReadBytes -1
client: Read error -12155: Not enough room in buffer for DTLS record.
client: Re-arming
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 30
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.ShortRead/1 (81 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.TestDtlsHolddownExpiry/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 33
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 30
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
Expiring holddown timer
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 30
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.TestDtlsHolddownExpiry/0 (79 ms)
[ RUN      ] DatagramOnly/TlsConnectDatagram.TestDtlsHolddownExpiry/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 33
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 32
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
Expiring holddown timer
client: Writing 50 bytes
server: Writing 50 bytes
Poll() waiters = 2 timers = 32
client: Readable
client: ReadBytes 50
client: Re-arming
server: Readable
server: ReadBytes 50
server: Re-arming
[       OK ] DatagramOnly/TlsConnectDatagram.TestDtlsHolddownExpiry/1 (80 ms)
[----------] 20 tests from DatagramOnly/TlsConnectDatagram (4758 ms total)

[----------] 45 tests from ExtensionStream/TlsExtensionTestGeneric
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 0052000006736572766572
handshake old: [163] 030339f30b280ea93badba7a6691701ee7eb080b90f1cb3b430ff075b0a5c446...
handshake new: [163] 030339f30b280ea93badba7a6691701ee7eb080b90f1cb3b430ff075b0a5c446...
record old: [167] 010000a3030339f30b280ea93badba7a6691701ee7eb080b90f1cb3b430ff075...
record new: [167] 010000a3030339f30b280ea93badba7a6691701ee7eb080b90f1cb3b430ff075...
client: Original packet: [172] 16030100a7010000a3030339f30b280ea93badba7a6691701ee7eb080b90f1cb...
client: Filtered packet: [172] 16030100a7010000a3030339f30b280ea93badba7a6691701ee7eb080b90f1cb...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 33
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/0 (34 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 0052000006736572766572
handshake old: [109] 030296162e4c5c2212099b16ae6a683d3e228226d8ca79ac204125fecc3406ec...
handshake new: [109] 030296162e4c5c2212099b16ae6a683d3e228226d8ca79ac204125fecc3406ec...
record old: [113] 0100006d030296162e4c5c2212099b16ae6a683d3e228226d8ca79ac204125fe...
record new: [113] 0100006d030296162e4c5c2212099b16ae6a683d3e228226d8ca79ac204125fe...
client: Original packet: [118] 16030100710100006d030296162e4c5c2212099b16ae6a683d3e228226d8ca79...
client: Filtered packet: [118] 16030100710100006d030296162e4c5c2212099b16ae6a683d3e228226d8ca79...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 31
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/1 (35 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 0052000006736572766572
handshake old: [109] 0301326e77a276d9e0927e26045c9063cd7a571ea6b66c5abfa937b17493f756...
handshake new: [109] 0301326e77a276d9e0927e26045c9063cd7a571ea6b66c5abfa937b17493f756...
record old: [113] 0100006d0301326e77a276d9e0927e26045c9063cd7a571ea6b66c5abfa937b1...
record new: [113] 0100006d0301326e77a276d9e0927e26045c9063cd7a571ea6b66c5abfa937b1...
client: Original packet: [118] 16030100710100006d0301326e77a276d9e0927e26045c9063cd7a571ea6b66c...
client: Filtered packet: [118] 16030100710100006d0301326e77a276d9e0927e26045c9063cd7a571ea6b66c...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 32
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/2 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 000900004f736572766572
handshake old: [163] 03035a86088bc064e0ac6adee2d162bdde7ec121e75452c8f4cdbd0a6146242b...
handshake new: [163] 03035a86088bc064e0ac6adee2d162bdde7ec121e75452c8f4cdbd0a6146242b...
record old: [167] 010000a303035a86088bc064e0ac6adee2d162bdde7ec121e75452c8f4cdbd0a...
record new: [167] 010000a303035a86088bc064e0ac6adee2d162bdde7ec121e75452c8f4cdbd0a...
client: Original packet: [172] 16030100a7010000a303035a86088bc064e0ac6adee2d162bdde7ec121e75452...
client: Filtered packet: [172] 16030100a7010000a303035a86088bc064e0ac6adee2d162bdde7ec121e75452...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 33
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/0 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 000900004f736572766572
handshake old: [109] 0302c7610ac9a49aa38af49c72841cfb76ac4863513fbd450f1ffae36705f52c...
handshake new: [109] 0302c7610ac9a49aa38af49c72841cfb76ac4863513fbd450f1ffae36705f52c...
record old: [113] 0100006d0302c7610ac9a49aa38af49c72841cfb76ac4863513fbd450f1ffae3...
record new: [113] 0100006d0302c7610ac9a49aa38af49c72841cfb76ac4863513fbd450f1ffae3...
client: Original packet: [118] 16030100710100006d0302c7610ac9a49aa38af49c72841cfb76ac4863513fbd...
client: Filtered packet: [118] 16030100710100006d0302c7610ac9a49aa38af49c72841cfb76ac4863513fbd...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 34
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/1 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 000900004f736572766572
handshake old: [109] 0301554030667f2c406056f7b5b6932878f57bbdd02734744d971647cb2865cd...
handshake new: [109] 0301554030667f2c406056f7b5b6932878f57bbdd02734744d971647cb2865cd...
record old: [113] 0100006d0301554030667f2c406056f7b5b6932878f57bbdd02734744d971647...
record new: [113] 0100006d0301554030667f2c406056f7b5b6932878f57bbdd02734744d971647...
client: Original packet: [118] 16030100710100006d0301554030667f2c406056f7b5b6932878f57bbdd02734...
client: Filtered packet: [118] 16030100710100006d0301554030667f2c406056f7b5b6932878f57bbdd02734...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 35
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/2 (25 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [7] 00090000067365
handshake old: [163] 0303ac50ca39193ea8cc381fdad99c7ec45cc600815c3dc00a244c4555f63e03...
handshake new: [159] 0303ac50ca39193ea8cc381fdad99c7ec45cc600815c3dc00a244c4555f63e03...
record old: [167] 010000a30303ac50ca39193ea8cc381fdad99c7ec45cc600815c3dc00a244c45...
record new: [163] 0100009f0303ac50ca39193ea8cc381fdad99c7ec45cc600815c3dc00a244c45...
client: Original packet: [172] 16030100a7010000a30303ac50ca39193ea8cc381fdad99c7ec45cc600815c3d...
client: Filtered packet: [168] 16030100a30100009f0303ac50ca39193ea8cc381fdad99c7ec45cc600815c3d...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 35
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/0 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [7] 00090000067365
handshake old: [109] 0302a1a11277d1eb041adb1b74bd2c9c4cd24d66108db663b6016251aa328d54...
handshake new: [105] 0302a1a11277d1eb041adb1b74bd2c9c4cd24d66108db663b6016251aa328d54...
record old: [113] 0100006d0302a1a11277d1eb041adb1b74bd2c9c4cd24d66108db663b6016251...
record new: [109] 010000690302a1a11277d1eb041adb1b74bd2c9c4cd24d66108db663b6016251...
client: Original packet: [118] 16030100710100006d0302a1a11277d1eb041adb1b74bd2c9c4cd24d66108db6...
client: Filtered packet: [114] 160301006d010000690302a1a11277d1eb041adb1b74bd2c9c4cd24d66108db6...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 36
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/1 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [7] 00090000067365
handshake old: [109] 0301ad65f9547e184c77beca3775866538aeeea9237a5fa5504ed5adf5e5bc1c...
handshake new: [105] 0301ad65f9547e184c77beca3775866538aeeea9237a5fa5504ed5adf5e5bc1c...
record old: [113] 0100006d0301ad65f9547e184c77beca3775866538aeeea9237a5fa5504ed5ad...
record new: [109] 010000690301ad65f9547e184c77beca3775866538aeeea9237a5fa5504ed5ad...
client: Original packet: [118] 16030100710100006d0301ad65f9547e184c77beca3775866538aeeea9237a5f...
client: Filtered packet: [114] 160301006d010000690301ad65f9547e184c77beca3775866538aeeea9237a5f...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 37
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/2 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [163] 03039398c7f4fd31a20cf0ae2dfbc20ee0a573d7296e9e7718c72bc955423b52...
handshake new: [181] 03039398c7f4fd31a20cf0ae2dfbc20ee0a573d7296e9e7718c72bc955423b52...
record old: [167] 010000a303039398c7f4fd31a20cf0ae2dfbc20ee0a573d7296e9e7718c72bc9...
record new: [185] 010000b503039398c7f4fd31a20cf0ae2dfbc20ee0a573d7296e9e7718c72bc9...
client: Original packet: [172] 16030100a7010000a303039398c7f4fd31a20cf0ae2dfbc20ee0a573d7296e9e...
client: Filtered packet: [190] 16030100b9010000b503039398c7f4fd31a20cf0ae2dfbc20ee0a573d7296e9e...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 38
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/0 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [109] 0302323ab17f3d75aa50c2abe34a652c5720c8371dcde90931669e46e6e0fe0f...
handshake new: [127] 0302323ab17f3d75aa50c2abe34a652c5720c8371dcde90931669e46e6e0fe0f...
record old: [113] 0100006d0302323ab17f3d75aa50c2abe34a652c5720c8371dcde90931669e46...
record new: [131] 0100007f0302323ab17f3d75aa50c2abe34a652c5720c8371dcde90931669e46...
client: Original packet: [118] 16030100710100006d0302323ab17f3d75aa50c2abe34a652c5720c8371dcde9...
client: Filtered packet: [136] 16030100830100007f0302323ab17f3d75aa50c2abe34a652c5720c8371dcde9...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 39
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/1 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [109] 030103883e73846d377821214e1323b12c137ad56a2b806f40d8227a107d1fd2...
handshake new: [127] 030103883e73846d377821214e1323b12c137ad56a2b806f40d8227a107d1fd2...
record old: [113] 0100006d030103883e73846d377821214e1323b12c137ad56a2b806f40d8227a...
record new: [131] 0100007f030103883e73846d377821214e1323b12c137ad56a2b806f40d8227a...
client: Original packet: [118] 16030100710100006d030103883e73846d377821214e1323b12c137ad56a2b80...
client: Filtered packet: [136] 16030100830100007f030103883e73846d377821214e1323b12c137ad56a2b80...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 39
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/2 (25 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.BadSni/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [17] 000000000c000009686f73742e6e616d65
handshake old: [163] 03034c71845a2e2abdd9a2292ea8534611fc176890b6798234e08d2d28a7e023...
handshake new: [169] 03034c71845a2e2abdd9a2292ea8534611fc176890b6798234e08d2d28a7e023...
record old: [167] 010000a303034c71845a2e2abdd9a2292ea8534611fc176890b6798234e08d2d...
record new: [173] 010000a903034c71845a2e2abdd9a2292ea8534611fc176890b6798234e08d2d...
client: Original packet: [172] 16030100a7010000a303034c71845a2e2abdd9a2292ea8534611fc176890b679...
client: Filtered packet: [178] 16030100ad010000a903034c71845a2e2abdd9a2292ea8534611fc176890b679...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 40
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/0 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.BadSni/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [17] 000000000c000009686f73742e6e616d65
handshake old: [109] 0302604d667c7e08bc46d1642522f31d068eb0dbe4e16018efca9ce7511eb657...
handshake new: [115] 0302604d667c7e08bc46d1642522f31d068eb0dbe4e16018efca9ce7511eb657...
record old: [113] 0100006d0302604d667c7e08bc46d1642522f31d068eb0dbe4e16018efca9ce7...
record new: [119] 010000730302604d667c7e08bc46d1642522f31d068eb0dbe4e16018efca9ce7...
client: Original packet: [118] 16030100710100006d0302604d667c7e08bc46d1642522f31d068eb0dbe4e160...
client: Filtered packet: [124] 1603010077010000730302604d667c7e08bc46d1642522f31d068eb0dbe4e160...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 41
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/1 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.BadSni/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [17] 000000000c000009686f73742e6e616d65
handshake old: [109] 030160e316d593a721ea3634e7f68019a92780615b858d1f71c89cf8a421aef1...
handshake new: [115] 030160e316d593a721ea3634e7f68019a92780615b858d1f71c89cf8a421aef1...
record old: [113] 0100006d030160e316d593a721ea3634e7f68019a92780615b858d1f71c89cf8...
record new: [119] 01000073030160e316d593a721ea3634e7f68019a92780615b858d1f71c89cf8...
client: Original packet: [118] 16030100710100006d030160e316d593a721ea3634e7f68019a92780615b858d...
client: Filtered packet: [124] 160301007701000073030160e316d593a721ea3634e7f68019a92780615b858d...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 42
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/2 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [2] 0000
handshake old: [163] 03034a2352a8053cb69f41e6fa90d8eb6fa5c9935a8286e3742aa0ada041bf58...
handshake new: [154] 03034a2352a8053cb69f41e6fa90d8eb6fa5c9935a8286e3742aa0ada041bf58...
record old: [167] 010000a303034a2352a8053cb69f41e6fa90d8eb6fa5c9935a8286e3742aa0ad...
record new: [158] 0100009a03034a2352a8053cb69f41e6fa90d8eb6fa5c9935a8286e3742aa0ad...
client: Original packet: [172] 16030100a7010000a303034a2352a8053cb69f41e6fa90d8eb6fa5c9935a8286...
client: Filtered packet: [163] 160301009e0100009a03034a2352a8053cb69f41e6fa90d8eb6fa5c9935a8286...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 43
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/0 (25 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [2] 0000
handshake old: [109] 03026b4b5ffe73f1b24d5dbef07c62ed67196519ea2e268e54d5b9dceee2e09b...
handshake new: [100] 03026b4b5ffe73f1b24d5dbef07c62ed67196519ea2e268e54d5b9dceee2e09b...
record old: [113] 0100006d03026b4b5ffe73f1b24d5dbef07c62ed67196519ea2e268e54d5b9dc...
record new: [104] 0100006403026b4b5ffe73f1b24d5dbef07c62ed67196519ea2e268e54d5b9dc...
client: Original packet: [118] 16030100710100006d03026b4b5ffe73f1b24d5dbef07c62ed67196519ea2e26...
client: Filtered packet: [109] 16030100680100006403026b4b5ffe73f1b24d5dbef07c62ed67196519ea2e26...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 43
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/1 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [2] 0000
handshake old: [109] 03013a2e6c22aa3f93e567a9880f01af45e30b6da16570fdeca85297fd22553b...
handshake new: [100] 03013a2e6c22aa3f93e567a9880f01af45e30b6da16570fdeca85297fd22553b...
record old: [113] 0100006d03013a2e6c22aa3f93e567a9880f01af45e30b6da16570fdeca85297...
record new: [104] 0100006403013a2e6c22aa3f93e567a9880f01af45e30b6da16570fdeca85297...
client: Original packet: [118] 16030100710100006d03013a2e6c22aa3f93e567a9880f01af45e30b6da16570...
client: Filtered packet: [109] 16030100680100006403013a2e6c22aa3f93e567a9880f01af45e30b6da16570...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 44
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/2 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [0] 
handshake old: [173] 03035c0fe85a6ab27b86f7dbab99b0d24c2bb056826d52dde61f315981488f41...
handshake new: [167] 03035c0fe85a6ab27b86f7dbab99b0d24c2bb056826d52dde61f315981488f41...
record old: [177] 010000ad03035c0fe85a6ab27b86f7dbab99b0d24c2bb056826d52dde61f3159...
record new: [171] 010000a703035c0fe85a6ab27b86f7dbab99b0d24c2bb056826d52dde61f3159...
client: Original packet: [182] 16030100b1010000ad03035c0fe85a6ab27b86f7dbab99b0d24c2bb056826d52...
client: Filtered packet: [176] 16030100ab010000a703035c0fe85a6ab27b86f7dbab99b0d24c2bb056826d52...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 45
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/0 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [0] 
handshake old: [119] 0302335fce0563a2fd642143079075ed2c67af3d3927bda9acc667695570ac1b...
handshake new: [113] 0302335fce0563a2fd642143079075ed2c67af3d3927bda9acc667695570ac1b...
record old: [123] 010000770302335fce0563a2fd642143079075ed2c67af3d3927bda9acc66769...
record new: [117] 010000710302335fce0563a2fd642143079075ed2c67af3d3927bda9acc66769...
client: Original packet: [128] 160301007b010000770302335fce0563a2fd642143079075ed2c67af3d3927bd...
client: Filtered packet: [122] 1603010075010000710302335fce0563a2fd642143079075ed2c67af3d3927bd...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 46
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/1 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [0] 
handshake old: [119] 030165f2c87cf433042f31f955c909b92956727e63a82de17428dabccbc8218d...
handshake new: [113] 030165f2c87cf433042f31f955c909b92956727e63a82de17428dabccbc8218d...
record old: [123] 01000077030165f2c87cf433042f31f955c909b92956727e63a82de17428dabc...
record new: [117] 01000071030165f2c87cf433042f31f955c909b92956727e63a82de17428dabc...
client: Original packet: [128] 160301007b01000077030165f2c87cf433042f31f955c909b92956727e63a82d...
client: Filtered packet: [122] 160301007501000071030165f2c87cf433042f31f955c909b92956727e63a82d...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 47
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/2 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [2] 0000
handshake old: [173] 030360c73479b9827e6bdeda7a67b77d7d8b2d0d5a67fe34fbccbeac390faf92...
handshake new: [169] 030360c73479b9827e6bdeda7a67b77d7d8b2d0d5a67fe34fbccbeac390faf92...
record old: [177] 010000ad030360c73479b9827e6bdeda7a67b77d7d8b2d0d5a67fe34fbccbeac...
record new: [173] 010000a9030360c73479b9827e6bdeda7a67b77d7d8b2d0d5a67fe34fbccbeac...
client: Original packet: [182] 16030100b1010000ad030360c73479b9827e6bdeda7a67b77d7d8b2d0d5a67fe...
client: Filtered packet: [178] 16030100ad010000a9030360c73479b9827e6bdeda7a67b77d7d8b2d0d5a67fe...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 48
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/0 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [2] 0000
handshake old: [119] 0302e705a03cd95b398f106e8e99283ce1c1ef2529d775bca0608e6b6ac0e09c...
handshake new: [115] 0302e705a03cd95b398f106e8e99283ce1c1ef2529d775bca0608e6b6ac0e09c...
record old: [123] 010000770302e705a03cd95b398f106e8e99283ce1c1ef2529d775bca0608e6b...
record new: [119] 010000730302e705a03cd95b398f106e8e99283ce1c1ef2529d775bca0608e6b...
client: Original packet: [128] 160301007b010000770302e705a03cd95b398f106e8e99283ce1c1ef2529d775...
client: Filtered packet: [124] 1603010077010000730302e705a03cd95b398f106e8e99283ce1c1ef2529d775...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 48
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/1 (26 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [2] 0000
handshake old: [119] 0301498d88c5e958bf6d85c97b27ee5f5001239536ecc283b516566eb01f5e55...
handshake new: [115] 0301498d88c5e958bf6d85c97b27ee5f5001239536ecc283b516566eb01f5e55...
record old: [123] 010000770301498d88c5e958bf6d85c97b27ee5f5001239536ecc283b516566e...
record new: [119] 010000730301498d88c5e958bf6d85c97b27ee5f5001239536ecc283b516566e...
client: Original packet: [128] 160301007b010000770301498d88c5e958bf6d85c97b27ee5f5001239536ecc2...
client: Filtered packet: [124] 1603010077010000730301498d88c5e958bf6d85c97b27ee5f5001239536ecc2...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 49
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/2 (30 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [1] 00
handshake old: [173] 030315b20667661cffc518b19be5b5bb6b7c4983040c02f9f34fda2ac05c3763...
handshake new: [168] 030315b20667661cffc518b19be5b5bb6b7c4983040c02f9f34fda2ac05c3763...
record old: [177] 010000ad030315b20667661cffc518b19be5b5bb6b7c4983040c02f9f34fda2a...
record new: [172] 010000a8030315b20667661cffc518b19be5b5bb6b7c4983040c02f9f34fda2a...
client: Original packet: [182] 16030100b1010000ad030315b20667661cffc518b19be5b5bb6b7c4983040c02...
client: Filtered packet: [177] 16030100ac010000a8030315b20667661cffc518b19be5b5bb6b7c4983040c02...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 50
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/0 (31 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [1] 00
handshake old: [119] 03022855f0865835b2a5c3264cce52cd2cd738c1908ac5065238e2c1d224704f...
handshake new: [114] 03022855f0865835b2a5c3264cce52cd2cd738c1908ac5065238e2c1d224704f...
record old: [123] 0100007703022855f0865835b2a5c3264cce52cd2cd738c1908ac5065238e2c1...
record new: [118] 0100007203022855f0865835b2a5c3264cce52cd2cd738c1908ac5065238e2c1...
client: Original packet: [128] 160301007b0100007703022855f0865835b2a5c3264cce52cd2cd738c1908ac5...
client: Filtered packet: [123] 16030100760100007203022855f0865835b2a5c3264cce52cd2cd738c1908ac5...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 51
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/1 (28 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [1] 00
handshake old: [119] 03019114d8a1b219adb7ceb00d551d5308d8fdc107648e8786d948c82bafa18c...
handshake new: [114] 03019114d8a1b219adb7ceb00d551d5308d8fdc107648e8786d948c82bafa18c...
record old: [123] 0100007703019114d8a1b219adb7ceb00d551d5308d8fdc107648e8786d948c8...
record new: [118] 0100007203019114d8a1b219adb7ceb00d551d5308d8fdc107648e8786d948c8...
client: Original packet: [128] 160301007b0100007703019114d8a1b219adb7ceb00d551d5308d8fdc107648e...
client: Filtered packet: [123] 16030100760100007203019114d8a1b219adb7ceb00d551d5308d8fdc107648e...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 51
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/2 (34 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [5] 0004016101
handshake old: [173] 03032bf238c0cd0e1e54c2430f77974520306803892ca44051b5715966e5f005...
handshake new: [172] 03032bf238c0cd0e1e54c2430f77974520306803892ca44051b5715966e5f005...
record old: [177] 010000ad03032bf238c0cd0e1e54c2430f77974520306803892ca44051b57159...
record new: [176] 010000ac03032bf238c0cd0e1e54c2430f77974520306803892ca44051b57159...
client: Original packet: [182] 16030100b1010000ad03032bf238c0cd0e1e54c2430f77974520306803892ca4...
client: Filtered packet: [181] 16030100b0010000ac03032bf238c0cd0e1e54c2430f77974520306803892ca4...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 52
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/0 (30 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [5] 0004016101
handshake old: [119] 0302b2785fe562a5829227fdb28766dc4ffd3356bbfcaa4f036f95320a88c158...
handshake new: [118] 0302b2785fe562a5829227fdb28766dc4ffd3356bbfcaa4f036f95320a88c158...
record old: [123] 010000770302b2785fe562a5829227fdb28766dc4ffd3356bbfcaa4f036f9532...
record new: [122] 010000760302b2785fe562a5829227fdb28766dc4ffd3356bbfcaa4f036f9532...
client: Original packet: [128] 160301007b010000770302b2785fe562a5829227fdb28766dc4ffd3356bbfcaa...
client: Filtered packet: [127] 160301007a010000760302b2785fe562a5829227fdb28766dc4ffd3356bbfcaa...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 53
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/1 (35 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [5] 0004016101
handshake old: [119] 0301609f62bfe23ec166a6f946595ca486eeb0d8babf5c77e8fdc37c0968c8f7...
handshake new: [118] 0301609f62bfe23ec166a6f946595ca486eeb0d8babf5c77e8fdc37c0968c8f7...
record old: [123] 010000770301609f62bfe23ec166a6f946595ca486eeb0d8babf5c77e8fdc37c...
record new: [122] 010000760301609f62bfe23ec166a6f946595ca486eeb0d8babf5c77e8fdc37c...
client: Original packet: [128] 160301007b010000770301609f62bfe23ec166a6f946595ca486eeb0d8babf5c...
client: Filtered packet: [127] 160301007a010000760301609f62bfe23ec166a6f946595ca486eeb0d8babf5c...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 53
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/2 (34 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [3] 016100
handshake old: [173] 0303d117959f18be6e463ff680943f8c2df3bd07dd45bab2a5b4b9036756709a...
handshake new: [170] 0303d117959f18be6e463ff680943f8c2df3bd07dd45bab2a5b4b9036756709a...
record old: [177] 010000ad0303d117959f18be6e463ff680943f8c2df3bd07dd45bab2a5b4b903...
record new: [174] 010000aa0303d117959f18be6e463ff680943f8c2df3bd07dd45bab2a5b4b903...
client: Original packet: [182] 16030100b1010000ad0303d117959f18be6e463ff680943f8c2df3bd07dd45ba...
client: Filtered packet: [179] 16030100ae010000aa0303d117959f18be6e463ff680943f8c2df3bd07dd45ba...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 54
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/0 (28 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [3] 016100
handshake old: [119] 03025b5bc9155f6269443b8cb5b5b32d96bcdcfb5d7f9b7eb8a80800a23c7e26...
handshake new: [116] 03025b5bc9155f6269443b8cb5b5b32d96bcdcfb5d7f9b7eb8a80800a23c7e26...
record old: [123] 0100007703025b5bc9155f6269443b8cb5b5b32d96bcdcfb5d7f9b7eb8a80800...
record new: [120] 0100007403025b5bc9155f6269443b8cb5b5b32d96bcdcfb5d7f9b7eb8a80800...
client: Original packet: [128] 160301007b0100007703025b5bc9155f6269443b8cb5b5b32d96bcdcfb5d7f9b...
client: Filtered packet: [125] 16030100780100007403025b5bc9155f6269443b8cb5b5b32d96bcdcfb5d7f9b...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 55
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/1 (34 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [3] 016100
handshake old: [119] 030167eac43be45b6b11ad3c562e59be6fd9bc523f564519429623255474dfe9...
handshake new: [116] 030167eac43be45b6b11ad3c562e59be6fd9bc523f564519429623255474dfe9...
record old: [123] 01000077030167eac43be45b6b11ad3c562e59be6fd9bc523f56451942962325...
record new: [120] 01000074030167eac43be45b6b11ad3c562e59be6fd9bc523f56451942962325...
client: Original packet: [128] 160301007b01000077030167eac43be45b6b11ad3c562e59be6fd9bc523f5645...
client: Filtered packet: [125] 160301007801000074030167eac43be45b6b11ad3c562e59be6fd9bc523f5645...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 56
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/2 (27 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 57
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/0 (30 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 58
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/1 (30 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 59
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/2 (29 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [3] 000100
handshake old: [163] 0303a6d59ecffbb6f9a78195372dd7f24c62d7407018b7a8a62fa927e1d0f4c6...
handshake new: [158] 0303a6d59ecffbb6f9a78195372dd7f24c62d7407018b7a8a62fa927e1d0f4c6...
record old: [167] 010000a30303a6d59ecffbb6f9a78195372dd7f24c62d7407018b7a8a62fa927...
record new: [162] 0100009e0303a6d59ecffbb6f9a78195372dd7f24c62d7407018b7a8a62fa927...
client: Original packet: [172] 16030100a7010000a30303a6d59ecffbb6f9a78195372dd7f24c62d7407018b7...
client: Filtered packet: [167] 16030100a20100009e0303a6d59ecffbb6f9a78195372dd7f24c62d7407018b7...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 60
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/0 (31 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [3] 000100
handshake old: [109] 0302b6cecabfa8d7ef0ea21b7b19f7ed688f32721d2ac03fb7e7a3f13b577947...
handshake new: [104] 0302b6cecabfa8d7ef0ea21b7b19f7ed688f32721d2ac03fb7e7a3f13b577947...
record old: [113] 0100006d0302b6cecabfa8d7ef0ea21b7b19f7ed688f32721d2ac03fb7e7a3f1...
record new: [108] 010000680302b6cecabfa8d7ef0ea21b7b19f7ed688f32721d2ac03fb7e7a3f1...
client: Original packet: [118] 16030100710100006d0302b6cecabfa8d7ef0ea21b7b19f7ed688f32721d2ac0...
client: Filtered packet: [113] 160301006c010000680302b6cecabfa8d7ef0ea21b7b19f7ed688f32721d2ac0...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 61
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/1 (34 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [3] 000100
handshake old: [109] 03017c8e5a9c99d44e2e70ba7397fdedb0cdd44ee1fc6343ec980c687be9c25c...
handshake new: [104] 03017c8e5a9c99d44e2e70ba7397fdedb0cdd44ee1fc6343ec980c687be9c25c...
record old: [113] 0100006d03017c8e5a9c99d44e2e70ba7397fdedb0cdd44ee1fc6343ec980c68...
record new: [108] 0100006803017c8e5a9c99d44e2e70ba7397fdedb0cdd44ee1fc6343ec980c68...
client: Original packet: [118] 16030100710100006d03017c8e5a9c99d44e2e70ba7397fdedb0cdd44ee1fc63...
client: Filtered packet: [113] 160301006c0100006803017c8e5a9c99d44e2e70ba7397fdedb0cdd44ee1fc63...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 62
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/2 (31 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [4] 09990000
handshake old: [163] 0303d1f648431e28350c436a4094f65d80cca43e98a93c90f3421cf5f0a7961a...
handshake new: [159] 0303d1f648431e28350c436a4094f65d80cca43e98a93c90f3421cf5f0a7961a...
record old: [167] 010000a30303d1f648431e28350c436a4094f65d80cca43e98a93c90f3421cf5...
record new: [163] 0100009f0303d1f648431e28350c436a4094f65d80cca43e98a93c90f3421cf5...
client: Original packet: [172] 16030100a7010000a30303d1f648431e28350c436a4094f65d80cca43e98a93c...
client: Filtered packet: [168] 16030100a30100009f0303d1f648431e28350c436a4094f65d80cca43e98a93c...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 63
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 (25 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [4] 09990000
handshake old: [109] 03026a416c92e86373fb41f50b475d2c84a357b3db3f72bb01f9f53628d37d2d...
handshake new: [105] 03026a416c92e86373fb41f50b475d2c84a357b3db3f72bb01f9f53628d37d2d...
record old: [113] 0100006d03026a416c92e86373fb41f50b475d2c84a357b3db3f72bb01f9f536...
record new: [109] 0100006903026a416c92e86373fb41f50b475d2c84a357b3db3f72bb01f9f536...
client: Original packet: [118] 16030100710100006d03026a416c92e86373fb41f50b475d2c84a357b3db3f72...
client: Filtered packet: [114] 160301006d0100006903026a416c92e86373fb41f50b475d2c84a357b3db3f72...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 64
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 (34 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [4] 09990000
handshake old: [109] 0301d88a0480e337b111f7e5fb7a64c6f5848cd4dd19eb001ff12185e011005b...
handshake new: [105] 0301d88a0480e337b111f7e5fb7a64c6f5848cd4dd19eb001ff12185e011005b...
record old: [113] 0100006d0301d88a0480e337b111f7e5fb7a64c6f5848cd4dd19eb001ff12185...
record new: [109] 010000690301d88a0480e337b111f7e5fb7a64c6f5848cd4dd19eb001ff12185...
client: Original packet: [118] 16030100710100006d0301d88a0480e337b111f7e5fb7a64c6f5848cd4dd19eb...
client: Filtered packet: [114] 160301006d010000690301d88a0480e337b111f7e5fb7a64c6f5848cd4dd19eb...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 65
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 (24 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [5] 0002000000
handshake old: [163] 0303271f0e7af16a6e1c19414ea3538da9209ae42703d86baebec8b9f93d895d...
handshake new: [160] 0303271f0e7af16a6e1c19414ea3538da9209ae42703d86baebec8b9f93d895d...
record old: [167] 010000a30303271f0e7af16a6e1c19414ea3538da9209ae42703d86baebec8b9...
record new: [164] 010000a00303271f0e7af16a6e1c19414ea3538da9209ae42703d86baebec8b9...
client: Original packet: [172] 16030100a7010000a30303271f0e7af16a6e1c19414ea3538da9209ae42703d8...
client: Filtered packet: [169] 16030100a4010000a00303271f0e7af16a6e1c19414ea3538da9209ae42703d8...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 66
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 (33 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [5] 0002000000
handshake old: [109] 0302cd92397305854965423b1af661a15963fd2180fad30c9d1e6831ad0efbbf...
handshake new: [106] 0302cd92397305854965423b1af661a15963fd2180fad30c9d1e6831ad0efbbf...
record old: [113] 0100006d0302cd92397305854965423b1af661a15963fd2180fad30c9d1e6831...
record new: [110] 0100006a0302cd92397305854965423b1af661a15963fd2180fad30c9d1e6831...
client: Original packet: [118] 16030100710100006d0302cd92397305854965423b1af661a15963fd2180fad3...
client: Filtered packet: [115] 160301006e0100006a0302cd92397305854965423b1af661a15963fd2180fad3...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 67
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 (28 ms)
[ RUN      ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [5] 0002000000
handshake old: [109] 0301a3f42b609cdba45813f879f8b716f51a5c0cd151707b9b33a37b3f0df686...
handshake new: [106] 0301a3f42b609cdba45813f879f8b716f51a5c0cd151707b9b33a37b3f0df686...
record old: [113] 0100006d0301a3f42b609cdba45813f879f8b716f51a5c0cd151707b9b33a37b...
record new: [110] 0100006a0301a3f42b609cdba45813f879f8b716f51a5c0cd151707b9b33a37b...
client: Original packet: [118] 16030100710100006d0301a3f42b609cdba45813f879f8b716f51a5c0cd15170...
client: Filtered packet: [115] 160301006e0100006a0301a3f42b609cdba45813f879f8b716f51a5c0cd15170...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 68
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 (35 ms)
[----------] 45 tests from ExtensionStream/TlsExtensionTestGeneric (1261 ms total)

[----------] 60 tests from ExtensionDatagram/TlsExtensionTestGeneric
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 0052000006736572766572
handshake old: [163] 0303920cc1ccd80fa3246cd2273ee691b5fea04756036b8c84fd3efaf94e6538...
handshake new: [163] 0303920cc1ccd80fa3246cd2273ee691b5fea04756036b8c84fd3efaf94e6538...
record old: [167] 010000a30303920cc1ccd80fa3246cd2273ee691b5fea04756036b8c84fd3efa...
record new: [167] 010000a30303920cc1ccd80fa3246cd2273ee691b5fea04756036b8c84fd3efa...
client: Original packet: [172] 16030100a7010000a30303920cc1ccd80fa3246cd2273ee691b5fea04756036b...
client: Filtered packet: [172] 16030100a7010000a30303920cc1ccd80fa3246cd2273ee691b5fea04756036b...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 69
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/0 (31 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 0052000006736572766572
handshake old: [109] 030237289e689d4476cb627ff484f3666bc43126e960ac5ae30027b94a5f8ed8...
handshake new: [109] 030237289e689d4476cb627ff484f3666bc43126e960ac5ae30027b94a5f8ed8...
record old: [113] 0100006d030237289e689d4476cb627ff484f3666bc43126e960ac5ae30027b9...
record new: [113] 0100006d030237289e689d4476cb627ff484f3666bc43126e960ac5ae30027b9...
client: Original packet: [118] 16030100710100006d030237289e689d4476cb627ff484f3666bc43126e960ac...
client: Filtered packet: [118] 16030100710100006d030237289e689d4476cb627ff484f3666bc43126e960ac...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 70
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/1 (28 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 0052000006736572766572
handshake old: [160] fefd92612b9ed83caf018e70e6ffe39d58148a7992385beeba0672239248ab3f...
handshake new: [160] fefd92612b9ed83caf018e70e6ffe39d58148a7992385beeba0672239248ab3f...
record old: [172] 010000a000000000000000a0fefd92612b9ed83caf018e70e6ffe39d58148a79...
record new: [172] 010000a000000000000000a0fefd92612b9ed83caf018e70e6ffe39d58148a79...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd92612b9ed8...
client: Filtered packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd92612b9ed8...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 71
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/2 (35 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 0052000006736572766572
handshake old: [106] feff69b3ea12c967114db73107de72c411c2b1b22206aed14868135a8006b7a6...
handshake new: [106] feff69b3ea12c967114db73107de72c411c2b1b22206aed14868135a8006b7a6...
record old: [118] 0100006a000000000000006afeff69b3ea12c967114db73107de72c411c2b1b2...
record new: [118] 0100006a000000000000006afeff69b3ea12c967114db73107de72c411c2b1b2...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeff69b3ea12c9...
client: Filtered packet: [131] 16feff000000000000000000760100006a000000000000006afeff69b3ea12c9...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 73
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/3 (24 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 000900004f736572766572
handshake old: [163] 03038be727166022cb66ac2b48c329489f14084589995769d694406287ddb6ce...
handshake new: [163] 03038be727166022cb66ac2b48c329489f14084589995769d694406287ddb6ce...
record old: [167] 010000a303038be727166022cb66ac2b48c329489f14084589995769d6944062...
record new: [167] 010000a303038be727166022cb66ac2b48c329489f14084589995769d6944062...
client: Original packet: [172] 16030100a7010000a303038be727166022cb66ac2b48c329489f140845899957...
client: Filtered packet: [172] 16030100a7010000a303038be727166022cb66ac2b48c329489f140845899957...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 74
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/0 (24 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 000900004f736572766572
handshake old: [109] 030246f7775e8b557fa117fd89af410e2febf3ffd1dc3dc77a2e28857c0276d0...
handshake new: [109] 030246f7775e8b557fa117fd89af410e2febf3ffd1dc3dc77a2e28857c0276d0...
record old: [113] 0100006d030246f7775e8b557fa117fd89af410e2febf3ffd1dc3dc77a2e2885...
record new: [113] 0100006d030246f7775e8b557fa117fd89af410e2febf3ffd1dc3dc77a2e2885...
client: Original packet: [118] 16030100710100006d030246f7775e8b557fa117fd89af410e2febf3ffd1dc3d...
client: Filtered packet: [118] 16030100710100006d030246f7775e8b557fa117fd89af410e2febf3ffd1dc3d...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 75
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/1 (25 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 000900004f736572766572
handshake old: [160] fefd70a45438a1a4864c65b501c6094e7a433e71a9a0b9ba56a3442b51e365bf...
handshake new: [160] fefd70a45438a1a4864c65b501c6094e7a433e71a9a0b9ba56a3442b51e365bf...
record old: [172] 010000a000000000000000a0fefd70a45438a1a4864c65b501c6094e7a433e71...
record new: [172] 010000a000000000000000a0fefd70a45438a1a4864c65b501c6094e7a433e71...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd70a45438a1...
client: Filtered packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd70a45438a1...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 76
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/2 (24 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [11] 000900004f736572766572
handshake old: [106] feff3b9375a5830d64444d48a02ba0857f5b98ce80e3585bd09925f545418cf0...
handshake new: [106] feff3b9375a5830d64444d48a02ba0857f5b98ce80e3585bd09925f545418cf0...
record old: [118] 0100006a000000000000006afeff3b9375a5830d64444d48a02ba0857f5b98ce...
record new: [118] 0100006a000000000000006afeff3b9375a5830d64444d48a02ba0857f5b98ce...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeff3b9375a583...
client: Filtered packet: [131] 16feff000000000000000000760100006a000000000000006afeff3b9375a583...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 77
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/3 (24 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [7] 00090000067365
handshake old: [163] 0303c023f0560d0c4af1dc2aad06f712e6c1241e3bd41c9cb5fcd492c2056408...
handshake new: [159] 0303c023f0560d0c4af1dc2aad06f712e6c1241e3bd41c9cb5fcd492c2056408...
record old: [167] 010000a30303c023f0560d0c4af1dc2aad06f712e6c1241e3bd41c9cb5fcd492...
record new: [163] 0100009f0303c023f0560d0c4af1dc2aad06f712e6c1241e3bd41c9cb5fcd492...
client: Original packet: [172] 16030100a7010000a30303c023f0560d0c4af1dc2aad06f712e6c1241e3bd41c...
client: Filtered packet: [168] 16030100a30100009f0303c023f0560d0c4af1dc2aad06f712e6c1241e3bd41c...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 78
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/0 (35 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [7] 00090000067365
handshake old: [109] 03020336429c522843f332fac4358c7c72238f5755a7ed4f23014aece14b0c89...
handshake new: [105] 03020336429c522843f332fac4358c7c72238f5755a7ed4f23014aece14b0c89...
record old: [113] 0100006d03020336429c522843f332fac4358c7c72238f5755a7ed4f23014aec...
record new: [109] 0100006903020336429c522843f332fac4358c7c72238f5755a7ed4f23014aec...
client: Original packet: [118] 16030100710100006d03020336429c522843f332fac4358c7c72238f5755a7ed...
client: Filtered packet: [114] 160301006d0100006903020336429c522843f332fac4358c7c72238f5755a7ed...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 78
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/1 (24 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [7] 00090000067365
handshake old: [160] fefd3dbec19d6aade81700ab963ea3306e3229eb0736b6ea8b4cd1ff9c9aa195...
handshake new: [156] fefd3dbec19d6aade81700ab963ea3306e3229eb0736b6ea8b4cd1ff9c9aa195...
record old: [172] 010000a000000000000000a0fefd3dbec19d6aade81700ab963ea3306e3229eb...
record new: [168] 0100009c000000000000009cfefd3dbec19d6aade81700ab963ea3306e3229eb...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd3dbec19d6a...
client: Filtered packet: [181] 16fefd000000000000000000a80100009c000000000000009cfefd3dbec19d6a...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 79
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/2 (34 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [7] 00090000067365
handshake old: [106] feffbb4a8c44c5dcaa55c2406a62243a312720e5113b0c2ef8a50ae9c5f8cb44...
handshake new: [102] feffbb4a8c44c5dcaa55c2406a62243a312720e5113b0c2ef8a50ae9c5f8cb44...
record old: [118] 0100006a000000000000006afeffbb4a8c44c5dcaa55c2406a62243a312720e5...
record new: [114] 010000660000000000000066feffbb4a8c44c5dcaa55c2406a62243a312720e5...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeffbb4a8c44c5...
client: Filtered packet: [127] 16feff00000000000000000072010000660000000000000066feffbb4a8c44c5...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 81
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/3 (30 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [163] 0303564d461a8b6fe9372a8848e45293ca570cd8153878c0bbb7d39f6a7fe025...
handshake new: [181] 0303564d461a8b6fe9372a8848e45293ca570cd8153878c0bbb7d39f6a7fe025...
record old: [167] 010000a30303564d461a8b6fe9372a8848e45293ca570cd8153878c0bbb7d39f...
record new: [185] 010000b50303564d461a8b6fe9372a8848e45293ca570cd8153878c0bbb7d39f...
client: Original packet: [172] 16030100a7010000a30303564d461a8b6fe9372a8848e45293ca570cd8153878...
client: Filtered packet: [190] 16030100b9010000b50303564d461a8b6fe9372a8848e45293ca570cd8153878...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 81
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/0 (28 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [109] 0302f117ccbf6465b1c104bea44834d7560536837bf25e6f8020175248dbe532...
handshake new: [127] 0302f117ccbf6465b1c104bea44834d7560536837bf25e6f8020175248dbe532...
record old: [113] 0100006d0302f117ccbf6465b1c104bea44834d7560536837bf25e6f80201752...
record new: [131] 0100007f0302f117ccbf6465b1c104bea44834d7560536837bf25e6f80201752...
client: Original packet: [118] 16030100710100006d0302f117ccbf6465b1c104bea44834d7560536837bf25e...
client: Filtered packet: [136] 16030100830100007f0302f117ccbf6465b1c104bea44834d7560536837bf25e...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 81
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/1 (24 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [160] fefd89a1f03e25313b14aa4fdc6f011d7b65ef86c1b7e552d70b946d74920182...
handshake new: [178] fefd89a1f03e25313b14aa4fdc6f011d7b65ef86c1b7e552d70b946d74920182...
record old: [172] 010000a000000000000000a0fefd89a1f03e25313b14aa4fdc6f011d7b65ef86...
record new: [190] 010000b200000000000000b2fefd89a1f03e25313b14aa4fdc6f011d7b65ef86...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd89a1f03e25...
client: Filtered packet: [203] 16fefd000000000000000000be010000b200000000000000b2fefd89a1f03e25...
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 82
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/2 (24 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
handshake old: [106] feff9a70d421f8b125a6e397653dfef6f3b15b54d12e25a4365ac23be4f54646...
handshake new: [124] feff9a70d421f8b125a6e397653dfef6f3b15b54d12e25a4365ac23be4f54646...
record old: [118] 0100006a000000000000006afeff9a70d421f8b125a6e397653dfef6f3b15b54...
record new: [136] 0100007c000000000000007cfeff9a70d421f8b125a6e397653dfef6f3b15b54...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeff9a70d421f8...
client: Filtered packet: [149] 16feff000000000000000000880100007c000000000000007cfeff9a70d421f8...
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 83
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/3 (26 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [17] 000000000c000009686f73742e6e616d65
handshake old: [163] 0303704127c948bae7f3e3f757797ef404cee99ee73c50cb966dffcd222af7be...
handshake new: [169] 0303704127c948bae7f3e3f757797ef404cee99ee73c50cb966dffcd222af7be...
record old: [167] 010000a30303704127c948bae7f3e3f757797ef404cee99ee73c50cb966dffcd...
record new: [173] 010000a90303704127c948bae7f3e3f757797ef404cee99ee73c50cb966dffcd...
client: Original packet: [172] 16030100a7010000a30303704127c948bae7f3e3f757797ef404cee99ee73c50...
client: Filtered packet: [178] 16030100ad010000a90303704127c948bae7f3e3f757797ef404cee99ee73c50...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 84
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/0 (24 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [17] 000000000c000009686f73742e6e616d65
handshake old: [109] 030234bcc7d150f7fd3fa9483e4b3732a615d0d10293f78b119a71c910e26b8f...
handshake new: [115] 030234bcc7d150f7fd3fa9483e4b3732a615d0d10293f78b119a71c910e26b8f...
record old: [113] 0100006d030234bcc7d150f7fd3fa9483e4b3732a615d0d10293f78b119a71c9...
record new: [119] 01000073030234bcc7d150f7fd3fa9483e4b3732a615d0d10293f78b119a71c9...
client: Original packet: [118] 16030100710100006d030234bcc7d150f7fd3fa9483e4b3732a615d0d10293f7...
client: Filtered packet: [124] 160301007701000073030234bcc7d150f7fd3fa9483e4b3732a615d0d10293f7...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 84
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/1 (25 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [17] 000000000c000009686f73742e6e616d65
handshake old: [160] fefdd63457d637f449632887cc97fb0feba58e0dd33825e9cee61ac83a23cd40...
handshake new: [166] fefdd63457d637f449632887cc97fb0feba58e0dd33825e9cee61ac83a23cd40...
record old: [172] 010000a000000000000000a0fefdd63457d637f449632887cc97fb0feba58e0d...
record new: [178] 010000a600000000000000a6fefdd63457d637f449632887cc97fb0feba58e0d...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefdd63457d637...
client: Filtered packet: [191] 16fefd000000000000000000b2010000a600000000000000a6fefdd63457d637...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 84
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/2 (27 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [17] 000000000c000009686f73742e6e616d65
handshake old: [106] feff2fb363bcadc32f49ef302779a89825195d3447577a83efa1fde2fac48e11...
handshake new: [112] feff2fb363bcadc32f49ef302779a89825195d3447577a83efa1fde2fac48e11...
record old: [118] 0100006a000000000000006afeff2fb363bcadc32f49ef302779a89825195d34...
record new: [124] 010000700000000000000070feff2fb363bcadc32f49ef302779a89825195d34...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeff2fb363bcad...
client: Filtered packet: [137] 16feff0000000000000000007c010000700000000000000070feff2fb363bcad...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 85
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/3 (24 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [2] 0000
handshake old: [163] 0303b77b84bc8c1ac0eeeb708db5eb2381e2319ecd9382cb51f26a33b75a6bed...
handshake new: [154] 0303b77b84bc8c1ac0eeeb708db5eb2381e2319ecd9382cb51f26a33b75a6bed...
record old: [167] 010000a30303b77b84bc8c1ac0eeeb708db5eb2381e2319ecd9382cb51f26a33...
record new: [158] 0100009a0303b77b84bc8c1ac0eeeb708db5eb2381e2319ecd9382cb51f26a33...
client: Original packet: [172] 16030100a7010000a30303b77b84bc8c1ac0eeeb708db5eb2381e2319ecd9382...
client: Filtered packet: [163] 160301009e0100009a0303b77b84bc8c1ac0eeeb708db5eb2381e2319ecd9382...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 86
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/0 (24 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [2] 0000
handshake old: [109] 0302d04cd4633b66fa508e1c0c98bb78d7e3508ff4a448619493eb3c1323aa10...
handshake new: [100] 0302d04cd4633b66fa508e1c0c98bb78d7e3508ff4a448619493eb3c1323aa10...
record old: [113] 0100006d0302d04cd4633b66fa508e1c0c98bb78d7e3508ff4a448619493eb3c...
record new: [104] 010000640302d04cd4633b66fa508e1c0c98bb78d7e3508ff4a448619493eb3c...
client: Original packet: [118] 16030100710100006d0302d04cd4633b66fa508e1c0c98bb78d7e3508ff4a448...
client: Filtered packet: [109] 1603010068010000640302d04cd4633b66fa508e1c0c98bb78d7e3508ff4a448...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 87
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/1 (35 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [2] 0000
handshake old: [160] fefd51b0ae60a9683b6518d70f95633e779956d4346605f8f668c3faf039d718...
handshake new: [151] fefd51b0ae60a9683b6518d70f95633e779956d4346605f8f668c3faf039d718...
record old: [172] 010000a000000000000000a0fefd51b0ae60a9683b6518d70f95633e779956d4...
record new: [163] 010000970000000000000097fefd51b0ae60a9683b6518d70f95633e779956d4...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd51b0ae60a9...
client: Filtered packet: [176] 16fefd000000000000000000a3010000970000000000000097fefd51b0ae60a9...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 84
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/2 (28 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [11] 0009000006736572766572
extension new: [2] 0000
handshake old: [106] feff1a76dee843f4e1f23a2db862e9a3d6d3b0f19d76916cb05c3d0ad3333d28...
handshake new: [97] feff1a76dee843f4e1f23a2db862e9a3d6d3b0f19d76916cb05c3d0ad3333d28...
record old: [118] 0100006a000000000000006afeff1a76dee843f4e1f23a2db862e9a3d6d3b0f1...
record new: [109] 010000610000000000000061feff1a76dee843f4e1f23a2db862e9a3d6d3b0f1...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeff1a76dee843...
client: Filtered packet: [122] 16feff0000000000000000006d010000610000000000000061feff1a76dee843...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 86
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/3 (32 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [0] 
handshake old: [173] 0303e2d2c700a895e5d9d83003d081b7a747eb2f1314bdfd857c43164f4741c9...
handshake new: [167] 0303e2d2c700a895e5d9d83003d081b7a747eb2f1314bdfd857c43164f4741c9...
record old: [177] 010000ad0303e2d2c700a895e5d9d83003d081b7a747eb2f1314bdfd857c4316...
record new: [171] 010000a70303e2d2c700a895e5d9d83003d081b7a747eb2f1314bdfd857c4316...
client: Original packet: [182] 16030100b1010000ad0303e2d2c700a895e5d9d83003d081b7a747eb2f1314bd...
client: Filtered packet: [176] 16030100ab010000a70303e2d2c700a895e5d9d83003d081b7a747eb2f1314bd...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 86
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/0 (27 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [0] 
handshake old: [119] 0302811de30810149db3fa1385ddc35533952af1009177d9a18cd668f58a4e4f...
handshake new: [113] 0302811de30810149db3fa1385ddc35533952af1009177d9a18cd668f58a4e4f...
record old: [123] 010000770302811de30810149db3fa1385ddc35533952af1009177d9a18cd668...
record new: [117] 010000710302811de30810149db3fa1385ddc35533952af1009177d9a18cd668...
client: Original packet: [128] 160301007b010000770302811de30810149db3fa1385ddc35533952af1009177...
client: Filtered packet: [122] 1603010075010000710302811de30810149db3fa1385ddc35533952af1009177...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 86
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/1 (34 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [0] 
handshake old: [170] fefd5be8e998a3c79aa220b4c1d7cea60aa15afce4deb65bf32537fc8a630540...
handshake new: [164] fefd5be8e998a3c79aa220b4c1d7cea60aa15afce4deb65bf32537fc8a630540...
record old: [182] 010000aa00000000000000aafefd5be8e998a3c79aa220b4c1d7cea60aa15afc...
record new: [176] 010000a400000000000000a4fefd5be8e998a3c79aa220b4c1d7cea60aa15afc...
client: Original packet: [195] 16fefd000000000000000000b6010000aa00000000000000aafefd5be8e998a3...
client: Filtered packet: [189] 16fefd000000000000000000b0010000a400000000000000a4fefd5be8e998a3...
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 87
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/2 (28 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [0] 
handshake old: [116] feff3dbf128d3e6a01821f677d148963971ea99b954839d4d60fcd8d76fe746b...
handshake new: [110] feff3dbf128d3e6a01821f677d148963971ea99b954839d4d60fcd8d76fe746b...
record old: [128] 010000740000000000000074feff3dbf128d3e6a01821f677d148963971ea99b...
record new: [122] 0100006e000000000000006efeff3dbf128d3e6a01821f677d148963971ea99b...
client: Original packet: [141] 16feff00000000000000000080010000740000000000000074feff3dbf128d3e...
client: Filtered packet: [135] 16feff0000000000000000007a0100006e000000000000006efeff3dbf128d3e...
client: Would have blocked
server: Handshake
Alert: [2] 022f
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 88
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/3 (24 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [2] 0000
handshake old: [173] 030370c7123211848a48664cdb0a6d1f0666ed96954fe39f1d41ece31a788a00...
handshake new: [169] 030370c7123211848a48664cdb0a6d1f0666ed96954fe39f1d41ece31a788a00...
record old: [177] 010000ad030370c7123211848a48664cdb0a6d1f0666ed96954fe39f1d41ece3...
record new: [173] 010000a9030370c7123211848a48664cdb0a6d1f0666ed96954fe39f1d41ece3...
client: Original packet: [182] 16030100b1010000ad030370c7123211848a48664cdb0a6d1f0666ed96954fe3...
client: Filtered packet: [178] 16030100ad010000a9030370c7123211848a48664cdb0a6d1f0666ed96954fe3...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 89
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/0 (24 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [2] 0000
handshake old: [119] 0302eafc29c6583a0520f3f59277a3fe90a8dc771789017ab4d447c181cf07da...
handshake new: [115] 0302eafc29c6583a0520f3f59277a3fe90a8dc771789017ab4d447c181cf07da...
record old: [123] 010000770302eafc29c6583a0520f3f59277a3fe90a8dc771789017ab4d447c1...
record new: [119] 010000730302eafc29c6583a0520f3f59277a3fe90a8dc771789017ab4d447c1...
client: Original packet: [128] 160301007b010000770302eafc29c6583a0520f3f59277a3fe90a8dc77178901...
client: Filtered packet: [124] 1603010077010000730302eafc29c6583a0520f3f59277a3fe90a8dc77178901...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 89
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/1 (26 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [2] 0000
handshake old: [170] fefd626c382a2e7d9c8d0e52e4f96c2bbaeeaa3278d9ecc550700653ae0cea45...
handshake new: [166] fefd626c382a2e7d9c8d0e52e4f96c2bbaeeaa3278d9ecc550700653ae0cea45...
record old: [182] 010000aa00000000000000aafefd626c382a2e7d9c8d0e52e4f96c2bbaeeaa32...
record new: [178] 010000a600000000000000a6fefd626c382a2e7d9c8d0e52e4f96c2bbaeeaa32...
client: Original packet: [195] 16fefd000000000000000000b6010000aa00000000000000aafefd626c382a2e...
client: Filtered packet: [191] 16fefd000000000000000000b2010000a600000000000000a6fefd626c382a2e...
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 90
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/2 (24 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [2] 0000
handshake old: [116] feff5ddd1c17c13e624b24a4b2368261fc2e93a204a50a26ea70567de0c6fbd4...
handshake new: [112] feff5ddd1c17c13e624b24a4b2368261fc2e93a204a50a26ea70567de0c6fbd4...
record old: [128] 010000740000000000000074feff5ddd1c17c13e624b24a4b2368261fc2e93a2...
record new: [124] 010000700000000000000070feff5ddd1c17c13e624b24a4b2368261fc2e93a2...
client: Original packet: [141] 16feff00000000000000000080010000740000000000000074feff5ddd1c17c1...
client: Filtered packet: [137] 16feff0000000000000000007c010000700000000000000070feff5ddd1c17c1...
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 92
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/3 (34 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [1] 00
handshake old: [173] 0303b936b46e59557cf0fc9096daec35b90a7482b34e83a383f2f7aaf9ed78ea...
handshake new: [168] 0303b936b46e59557cf0fc9096daec35b90a7482b34e83a383f2f7aaf9ed78ea...
record old: [177] 010000ad0303b936b46e59557cf0fc9096daec35b90a7482b34e83a383f2f7aa...
record new: [172] 010000a80303b936b46e59557cf0fc9096daec35b90a7482b34e83a383f2f7aa...
client: Original packet: [182] 16030100b1010000ad0303b936b46e59557cf0fc9096daec35b90a7482b34e83...
client: Filtered packet: [177] 16030100ac010000a80303b936b46e59557cf0fc9096daec35b90a7482b34e83...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 93
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/0 (25 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [1] 00
handshake old: [119] 03021e209e3a3c61cd98e637335152669f41d098116bea2bba884dc7a7d0f668...
handshake new: [114] 03021e209e3a3c61cd98e637335152669f41d098116bea2bba884dc7a7d0f668...
record old: [123] 0100007703021e209e3a3c61cd98e637335152669f41d098116bea2bba884dc7...
record new: [118] 0100007203021e209e3a3c61cd98e637335152669f41d098116bea2bba884dc7...
client: Original packet: [128] 160301007b0100007703021e209e3a3c61cd98e637335152669f41d098116bea...
client: Filtered packet: [123] 16030100760100007203021e209e3a3c61cd98e637335152669f41d098116bea...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 93
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/1 (24 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [1] 00
handshake old: [170] fefd775f76396c5e2af4ca05611b6c3e0b7ccdc561d1a2bce13435677294227d...
handshake new: [165] fefd775f76396c5e2af4ca05611b6c3e0b7ccdc561d1a2bce13435677294227d...
record old: [182] 010000aa00000000000000aafefd775f76396c5e2af4ca05611b6c3e0b7ccdc5...
record new: [177] 010000a500000000000000a5fefd775f76396c5e2af4ca05611b6c3e0b7ccdc5...
client: Original packet: [195] 16fefd000000000000000000b6010000aa00000000000000aafefd775f76396c...
client: Filtered packet: [190] 16fefd000000000000000000b1010000a500000000000000a5fefd775f76396c...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 95
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/2 (24 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [1] 00
handshake old: [116] feff2f5055924bc31ce8d1f4695607d8d34f2dd1becbc4332bbc401b6670577d...
handshake new: [111] feff2f5055924bc31ce8d1f4695607d8d34f2dd1becbc4332bbc401b6670577d...
record old: [128] 010000740000000000000074feff2f5055924bc31ce8d1f4695607d8d34f2dd1...
record new: [123] 0100006f000000000000006ffeff2f5055924bc31ce8d1f4695607d8d34f2dd1...
client: Original packet: [141] 16feff00000000000000000080010000740000000000000074feff2f5055924b...
client: Filtered packet: [136] 16feff0000000000000000007b0100006f000000000000006ffeff2f5055924b...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 96
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/3 (24 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [5] 0004016101
handshake old: [173] 03038577b617fb813ebbaf411d8aef63338a36a89c2bc2a32a374b4ccc78bb83...
handshake new: [172] 03038577b617fb813ebbaf411d8aef63338a36a89c2bc2a32a374b4ccc78bb83...
record old: [177] 010000ad03038577b617fb813ebbaf411d8aef63338a36a89c2bc2a32a374b4c...
record new: [176] 010000ac03038577b617fb813ebbaf411d8aef63338a36a89c2bc2a32a374b4c...
client: Original packet: [182] 16030100b1010000ad03038577b617fb813ebbaf411d8aef63338a36a89c2bc2...
client: Filtered packet: [181] 16030100b0010000ac03038577b617fb813ebbaf411d8aef63338a36a89c2bc2...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 97
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/0 (29 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [5] 0004016101
handshake old: [119] 030244be68709dcd344642072d1e3234a47a93a04283e7575edb20397e045660...
handshake new: [118] 030244be68709dcd344642072d1e3234a47a93a04283e7575edb20397e045660...
record old: [123] 01000077030244be68709dcd344642072d1e3234a47a93a04283e7575edb2039...
record new: [122] 01000076030244be68709dcd344642072d1e3234a47a93a04283e7575edb2039...
client: Original packet: [128] 160301007b01000077030244be68709dcd344642072d1e3234a47a93a04283e7...
client: Filtered packet: [127] 160301007a01000076030244be68709dcd344642072d1e3234a47a93a04283e7...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 96
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/1 (31 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [5] 0004016101
handshake old: [170] fefd8813feb806edbc94450396a7bb147d4d34cb63f2148b54650e2f350027a7...
handshake new: [169] fefd8813feb806edbc94450396a7bb147d4d34cb63f2148b54650e2f350027a7...
record old: [182] 010000aa00000000000000aafefd8813feb806edbc94450396a7bb147d4d34cb...
record new: [181] 010000a900000000000000a9fefd8813feb806edbc94450396a7bb147d4d34cb...
client: Original packet: [195] 16fefd000000000000000000b6010000aa00000000000000aafefd8813feb806...
client: Filtered packet: [194] 16fefd000000000000000000b5010000a900000000000000a9fefd8813feb806...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 97
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/2 (30 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [5] 0004016101
handshake old: [116] feffc34fbcc58cb2bf6529b5a0aeed17d5595368bf97e9fa868020e4c368cb4d...
handshake new: [115] feffc34fbcc58cb2bf6529b5a0aeed17d5595368bf97e9fa868020e4c368cb4d...
record old: [128] 010000740000000000000074feffc34fbcc58cb2bf6529b5a0aeed17d5595368...
record new: [127] 010000730000000000000073feffc34fbcc58cb2bf6529b5a0aeed17d5595368...
client: Original packet: [141] 16feff00000000000000000080010000740000000000000074feffc34fbcc58c...
client: Filtered packet: [140] 16feff0000000000000000007f010000730000000000000073feffc34fbcc58c...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 99
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/3 (31 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [3] 016100
handshake old: [173] 030348e068ed472886a9937304bacf27b6f39ee258e614719b3899531c585f8b...
handshake new: [170] 030348e068ed472886a9937304bacf27b6f39ee258e614719b3899531c585f8b...
record old: [177] 010000ad030348e068ed472886a9937304bacf27b6f39ee258e614719b389953...
record new: [174] 010000aa030348e068ed472886a9937304bacf27b6f39ee258e614719b389953...
client: Original packet: [182] 16030100b1010000ad030348e068ed472886a9937304bacf27b6f39ee258e614...
client: Filtered packet: [179] 16030100ae010000aa030348e068ed472886a9937304bacf27b6f39ee258e614...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 100
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/0 (30 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [3] 016100
handshake old: [119] 030293f185b062ad1cd156a803de11d3e0d492b1ca15baac70cbbed486f8cd97...
handshake new: [116] 030293f185b062ad1cd156a803de11d3e0d492b1ca15baac70cbbed486f8cd97...
record old: [123] 01000077030293f185b062ad1cd156a803de11d3e0d492b1ca15baac70cbbed4...
record new: [120] 01000074030293f185b062ad1cd156a803de11d3e0d492b1ca15baac70cbbed4...
client: Original packet: [128] 160301007b01000077030293f185b062ad1cd156a803de11d3e0d492b1ca15ba...
client: Filtered packet: [125] 160301007801000074030293f185b062ad1cd156a803de11d3e0d492b1ca15ba...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 100
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/1 (31 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [3] 016100
handshake old: [170] fefd4c2a648b533791c98d93859dab528a0f4e8ffe1335971ce52f9f290f94a5...
handshake new: [167] fefd4c2a648b533791c98d93859dab528a0f4e8ffe1335971ce52f9f290f94a5...
record old: [182] 010000aa00000000000000aafefd4c2a648b533791c98d93859dab528a0f4e8f...
record new: [179] 010000a700000000000000a7fefd4c2a648b533791c98d93859dab528a0f4e8f...
client: Original packet: [195] 16fefd000000000000000000b6010000aa00000000000000aafefd4c2a648b53...
client: Filtered packet: [192] 16fefd000000000000000000b3010000a700000000000000a7fefd4c2a648b53...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 101
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/2 (32 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [6] 000401610162
extension new: [3] 016100
handshake old: [116] feff923c7f2a46b1ddb12c7572272fa2e6272f05e6c043b86645a4f19ddaa58c...
handshake new: [113] feff923c7f2a46b1ddb12c7572272fa2e6272f05e6c043b86645a4f19ddaa58c...
record old: [128] 010000740000000000000074feff923c7f2a46b1ddb12c7572272fa2e6272f05...
record new: [125] 010000710000000000000071feff923c7f2a46b1ddb12c7572272fa2e6272f05...
client: Original packet: [141] 16feff00000000000000000080010000740000000000000074feff923c7f2a46...
client: Filtered packet: [138] 16feff0000000000000000007d010000710000000000000071feff923c7f2a46...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 103
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/3 (25 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 104
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/0 (26 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 104
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/1 (29 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 105
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/2 (29 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Alert: [2] 0278
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 107
client: Readable
client: Handshake
client: Handshake failed with SSL error 57: SSL received an alert record with an unknown alert description.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/3 (29 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [3] 000100
handshake old: [163] 030371c0ddd835ca9e05769acf641d34c638f3a9d72595b7873def1d15bfd3c9...
handshake new: [158] 030371c0ddd835ca9e05769acf641d34c638f3a9d72595b7873def1d15bfd3c9...
record old: [167] 010000a3030371c0ddd835ca9e05769acf641d34c638f3a9d72595b7873def1d...
record new: [162] 0100009e030371c0ddd835ca9e05769acf641d34c638f3a9d72595b7873def1d...
client: Original packet: [172] 16030100a7010000a3030371c0ddd835ca9e05769acf641d34c638f3a9d72595...
client: Filtered packet: [167] 16030100a20100009e030371c0ddd835ca9e05769acf641d34c638f3a9d72595...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 108
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/0 (34 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [3] 000100
handshake old: [109] 0302570ef0751c0d2280053cc86c845fc40f54f6e01662fd89006b18d0d50ada...
handshake new: [104] 0302570ef0751c0d2280053cc86c845fc40f54f6e01662fd89006b18d0d50ada...
record old: [113] 0100006d0302570ef0751c0d2280053cc86c845fc40f54f6e01662fd89006b18...
record new: [108] 010000680302570ef0751c0d2280053cc86c845fc40f54f6e01662fd89006b18...
client: Original packet: [118] 16030100710100006d0302570ef0751c0d2280053cc86c845fc40f54f6e01662...
client: Filtered packet: [113] 160301006c010000680302570ef0751c0d2280053cc86c845fc40f54f6e01662...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 108
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/1 (28 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [3] 000100
handshake old: [160] fefd3170997ff3ddf77612ffaed70a0129615eb6b9eed4e6b22f971a78d016bc...
handshake new: [155] fefd3170997ff3ddf77612ffaed70a0129615eb6b9eed4e6b22f971a78d016bc...
record old: [172] 010000a000000000000000a0fefd3170997ff3ddf77612ffaed70a0129615eb6...
record new: [167] 0100009b000000000000009bfefd3170997ff3ddf77612ffaed70a0129615eb6...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd3170997ff3...
client: Filtered packet: [180] 16fefd000000000000000000a70100009b000000000000009bfefd3170997ff3...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 109
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/2 (24 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [3] 000100
handshake old: [106] feffbf9d900793df2f3f8e4c389f3069e5c6d236407a0428620a876b1dcea8cb...
handshake new: [101] feffbf9d900793df2f3f8e4c389f3069e5c6d236407a0428620a876b1dcea8cb...
record old: [118] 0100006a000000000000006afeffbf9d900793df2f3f8e4c389f3069e5c6d236...
record new: [113] 010000650000000000000065feffbf9d900793df2f3f8e4c389f3069e5c6d236...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeffbf9d900793...
client: Filtered packet: [126] 16feff00000000000000000071010000650000000000000065feffbf9d900793...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 110
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/3 (31 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [4] 09990000
handshake old: [163] 0303a2fded58ed2e56a30f24844a995489af6e728c64264fdd1a1e682d2f1997...
handshake new: [159] 0303a2fded58ed2e56a30f24844a995489af6e728c64264fdd1a1e682d2f1997...
record old: [167] 010000a30303a2fded58ed2e56a30f24844a995489af6e728c64264fdd1a1e68...
record new: [163] 0100009f0303a2fded58ed2e56a30f24844a995489af6e728c64264fdd1a1e68...
client: Original packet: [172] 16030100a7010000a30303a2fded58ed2e56a30f24844a995489af6e728c6426...
client: Filtered packet: [168] 16030100a30100009f0303a2fded58ed2e56a30f24844a995489af6e728c6426...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 111
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 (30 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [4] 09990000
handshake old: [109] 03026589f8f3cde11a878fdc9977d44c15b32a61797abfa92a2e31e42b2f5d6d...
handshake new: [105] 03026589f8f3cde11a878fdc9977d44c15b32a61797abfa92a2e31e42b2f5d6d...
record old: [113] 0100006d03026589f8f3cde11a878fdc9977d44c15b32a61797abfa92a2e31e4...
record new: [109] 0100006903026589f8f3cde11a878fdc9977d44c15b32a61797abfa92a2e31e4...
client: Original packet: [118] 16030100710100006d03026589f8f3cde11a878fdc9977d44c15b32a61797abf...
client: Filtered packet: [114] 160301006d0100006903026589f8f3cde11a878fdc9977d44c15b32a61797abf...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 111
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 (28 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [4] 09990000
handshake old: [160] fefd6b187673300fbf87a01183fb8fbef151c2484dea2f5a48c5fb7ddcd15002...
handshake new: [156] fefd6b187673300fbf87a01183fb8fbef151c2484dea2f5a48c5fb7ddcd15002...
record old: [172] 010000a000000000000000a0fefd6b187673300fbf87a01183fb8fbef151c248...
record new: [168] 0100009c000000000000009cfefd6b187673300fbf87a01183fb8fbef151c248...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd6b18767330...
client: Filtered packet: [181] 16fefd000000000000000000a80100009c000000000000009cfefd6b18767330...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 112
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 (34 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [4] 09990000
handshake old: [106] feff5dfe4fdef154e1bc7428a66c975f20e0ba5c49ca7325daf2ca65910fcaff...
handshake new: [102] feff5dfe4fdef154e1bc7428a66c975f20e0ba5c49ca7325daf2ca65910fcaff...
record old: [118] 0100006a000000000000006afeff5dfe4fdef154e1bc7428a66c975f20e0ba5c...
record new: [114] 010000660000000000000066feff5dfe4fdef154e1bc7428a66c975f20e0ba5c...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeff5dfe4fdef1...
client: Filtered packet: [127] 16feff00000000000000000072010000660000000000000066feff5dfe4fdef1...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 113
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/3 (33 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [5] 0002000000
handshake old: [163] 0303cd89f6c6ae54aad37fe0a20a4741536f515859b2b8f45323162923dff61c...
handshake new: [160] 0303cd89f6c6ae54aad37fe0a20a4741536f515859b2b8f45323162923dff61c...
record old: [167] 010000a30303cd89f6c6ae54aad37fe0a20a4741536f515859b2b8f453231629...
record new: [164] 010000a00303cd89f6c6ae54aad37fe0a20a4741536f515859b2b8f453231629...
client: Original packet: [172] 16030100a7010000a30303cd89f6c6ae54aad37fe0a20a4741536f515859b2b8...
client: Filtered packet: [169] 16030100a4010000a00303cd89f6c6ae54aad37fe0a20a4741536f515859b2b8...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 114
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 (24 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [5] 0002000000
handshake old: [109] 0302b6a5598ad10ae50b2606cd6ded341f06fb8826c7f4a96b3c443de2de9b9c...
handshake new: [106] 0302b6a5598ad10ae50b2606cd6ded341f06fb8826c7f4a96b3c443de2de9b9c...
record old: [113] 0100006d0302b6a5598ad10ae50b2606cd6ded341f06fb8826c7f4a96b3c443d...
record new: [110] 0100006a0302b6a5598ad10ae50b2606cd6ded341f06fb8826c7f4a96b3c443d...
client: Original packet: [118] 16030100710100006d0302b6a5598ad10ae50b2606cd6ded341f06fb8826c7f4...
client: Filtered packet: [115] 160301006e0100006a0302b6a5598ad10ae50b2606cd6ded341f06fb8826c7f4...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 114
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 (25 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [5] 0002000000
handshake old: [160] fefd08aeb31e606406ba1057241c7f41d8eb4b553e5264cae64c0670bf8faeb3...
handshake new: [157] fefd08aeb31e606406ba1057241c7f41d8eb4b553e5264cae64c0670bf8faeb3...
record old: [172] 010000a000000000000000a0fefd08aeb31e606406ba1057241c7f41d8eb4b55...
record new: [169] 0100009d000000000000009dfefd08aeb31e606406ba1057241c7f41d8eb4b55...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd08aeb31e60...
client: Filtered packet: [182] 16fefd000000000000000000a90100009d000000000000009dfefd08aeb31e60...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 115
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 (28 ms)
[ RUN      ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/3
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [8] 0006001700180019
extension new: [5] 0002000000
handshake old: [106] feff2f7642c08657f82a4baa1cfc52a4da864cece98fa99b4b64f0fafca0b951...
handshake new: [103] feff2f7642c08657f82a4baa1cfc52a4da864cece98fa99b4b64f0fafca0b951...
record old: [118] 0100006a000000000000006afeff2f7642c08657f82a4baa1cfc52a4da864cec...
record new: [115] 010000670000000000000067feff2f7642c08657f82a4baa1cfc52a4da864cec...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeff2f7642c086...
client: Filtered packet: [128] 16feff00000000000000000073010000670000000000000067feff2f7642c086...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 116
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/3 (35 ms)
[----------] 60 tests from ExtensionDatagram/TlsExtensionTestGeneric (1693 ms total)

[----------] 48 tests from ExtensionPre13Stream/TlsExtensionTestPre13
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [2] 0000
handshake old: [95] 0301ef27324e2a7b3febc381b0bd253f6d6ba11a12f5197f4e8fafc56ca4353e...
handshake new: [93] 0301ef27324e2a7b3febc381b0bd253f6d6ba11a12f5197f4e8fafc56ca4353e...
record old: [748] 0200005f0301ef27324e2a7b3febc381b0bd253f6d6ba11a12f5197f4e8fafc5...
record new: [746] 0200005d0301ef27324e2a7b3febc381b0bd253f6d6ba11a12f5197f4e8fafc5...
server: Original packet: [753] 16030102ec0200005f0301ef27324e2a7b3febc381b0bd253f6d6ba11a12f519...
server: Filtered packet: [751] 16030102ea0200005d0301ef27324e2a7b3febc381b0bd253f6d6ba11a12f519...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 117
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 116
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 (40 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [2] 0000
handshake old: [95] 0302837d12e78da1d207241f147372f171aa3d19a20b0505618969897235d29b...
handshake new: [93] 0302837d12e78da1d207241f147372f171aa3d19a20b0505618969897235d29b...
record old: [748] 0200005f0302837d12e78da1d207241f147372f171aa3d19a20b050561896989...
record new: [746] 0200005d0302837d12e78da1d207241f147372f171aa3d19a20b050561896989...
server: Original packet: [753] 16030202ec0200005f0302837d12e78da1d207241f147372f171aa3d19a20b05...
server: Filtered packet: [751] 16030202ea0200005d0302837d12e78da1d207241f147372f171aa3d19a20b05...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 117
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 (48 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [2] 0000
handshake old: [95] 0303520cbb7e83585523d42cb478c1daebd5b82d9f000f9c7dad991be437da06...
handshake new: [93] 0303520cbb7e83585523d42cb478c1daebd5b82d9f000f9c7dad991be437da06...
record old: [750] 0200005f0303520cbb7e83585523d42cb478c1daebd5b82d9f000f9c7dad991b...
record new: [748] 0200005d0303520cbb7e83585523d42cb478c1daebd5b82d9f000f9c7dad991b...
server: Original packet: [755] 16030302ee0200005f0303520cbb7e83585523d42cb478c1daebd5b82d9f000f...
server: Filtered packet: [753] 16030302ec0200005d0303520cbb7e83585523d42cb478c1daebd5b82d9f000f...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 117
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 117
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 (43 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [3] 000100
handshake old: [95] 0301f2a87259854b927526539e8ec00fbdaa2dad997e9b4e4466b059f60a1555...
handshake new: [94] 0301f2a87259854b927526539e8ec00fbdaa2dad997e9b4e4466b059f60a1555...
record old: [748] 0200005f0301f2a87259854b927526539e8ec00fbdaa2dad997e9b4e4466b059...
record new: [747] 0200005e0301f2a87259854b927526539e8ec00fbdaa2dad997e9b4e4466b059...
server: Original packet: [753] 16030102ec0200005f0301f2a87259854b927526539e8ec00fbdaa2dad997e9b...
server: Filtered packet: [752] 16030102eb0200005e0301f2a87259854b927526539e8ec00fbdaa2dad997e9b...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 118
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 (38 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [3] 000100
handshake old: [95] 0302bad44461efbb69c326ba06dd63baef1f81bc489ed4f593a075e5ebccb51e...
handshake new: [94] 0302bad44461efbb69c326ba06dd63baef1f81bc489ed4f593a075e5ebccb51e...
record old: [748] 0200005f0302bad44461efbb69c326ba06dd63baef1f81bc489ed4f593a075e5...
record new: [747] 0200005e0302bad44461efbb69c326ba06dd63baef1f81bc489ed4f593a075e5...
server: Original packet: [753] 16030202ec0200005f0302bad44461efbb69c326ba06dd63baef1f81bc489ed4...
server: Filtered packet: [752] 16030202eb0200005e0302bad44461efbb69c326ba06dd63baef1f81bc489ed4...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 119
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 119
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 (35 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [3] 000100
handshake old: [95] 0303749fe437359bea0dae1b5877dcc6efdf1a09218685d829199c28de657541...
handshake new: [94] 0303749fe437359bea0dae1b5877dcc6efdf1a09218685d829199c28de657541...
record old: [750] 0200005f0303749fe437359bea0dae1b5877dcc6efdf1a09218685d829199c28...
record new: [749] 0200005e0303749fe437359bea0dae1b5877dcc6efdf1a09218685d829199c28...
server: Original packet: [755] 16030302ee0200005f0303749fe437359bea0dae1b5877dcc6efdf1a09218685...
server: Filtered packet: [754] 16030302ed0200005e0303749fe437359bea0dae1b5877dcc6efdf1a09218685...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 120
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 (44 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0002016100
handshake old: [95] 03017a0175435be63f25a332fc418f19077e0499f98756c09cfa0ee495d47ac3...
handshake new: [96] 03017a0175435be63f25a332fc418f19077e0499f98756c09cfa0ee495d47ac3...
record old: [748] 0200005f03017a0175435be63f25a332fc418f19077e0499f98756c09cfa0ee4...
record new: [749] 0200006003017a0175435be63f25a332fc418f19077e0499f98756c09cfa0ee4...
server: Original packet: [753] 16030102ec0200005f03017a0175435be63f25a332fc418f19077e0499f98756...
server: Filtered packet: [754] 16030102ed0200006003017a0175435be63f25a332fc418f19077e0499f98756...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 121
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 121
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 (35 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0002016100
handshake old: [95] 03024b3aae260b3439a353c1d4c45f56f8bd4ee37df427c48c5ca1d792618a44...
handshake new: [96] 03024b3aae260b3439a353c1d4c45f56f8bd4ee37df427c48c5ca1d792618a44...
record old: [748] 0200005f03024b3aae260b3439a353c1d4c45f56f8bd4ee37df427c48c5ca1d7...
record new: [749] 0200006003024b3aae260b3439a353c1d4c45f56f8bd4ee37df427c48c5ca1d7...
server: Original packet: [753] 16030202ec0200005f03024b3aae260b3439a353c1d4c45f56f8bd4ee37df427...
server: Filtered packet: [754] 16030202ed0200006003024b3aae260b3439a353c1d4c45f56f8bd4ee37df427...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 122
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 (36 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0002016100
handshake old: [95] 0303619b52da3a676db74fb5d943dfe812e2c23e006ce15859bf083524bb9dbd...
handshake new: [96] 0303619b52da3a676db74fb5d943dfe812e2c23e006ce15859bf083524bb9dbd...
record old: [750] 0200005f0303619b52da3a676db74fb5d943dfe812e2c23e006ce15859bf0835...
record new: [751] 020000600303619b52da3a676db74fb5d943dfe812e2c23e006ce15859bf0835...
server: Original packet: [755] 16030302ee0200005f0303619b52da3a676db74fb5d943dfe812e2c23e006ce1...
server: Filtered packet: [756] 16030302ef020000600303619b52da3a676db74fb5d943dfe812e2c23e006ce1...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 123
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 122
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 (35 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [6] 000401610162
handshake old: [95] 0301a7f48b33db29973c03a358b26d05565894826158836919077a1b66182f33...
handshake new: [97] 0301a7f48b33db29973c03a358b26d05565894826158836919077a1b66182f33...
record old: [748] 0200005f0301a7f48b33db29973c03a358b26d05565894826158836919077a1b...
record new: [750] 020000610301a7f48b33db29973c03a358b26d05565894826158836919077a1b...
server: Original packet: [753] 16030102ec0200005f0301a7f48b33db29973c03a358b26d0556589482615883...
server: Filtered packet: [755] 16030102ee020000610301a7f48b33db29973c03a358b26d0556589482615883...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 123
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 (48 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [6] 000401610162
handshake old: [95] 0302a48ed01c4dad612fc1a4d6f1f842c5e165860d56c3fd1076f498a898e18c...
handshake new: [97] 0302a48ed01c4dad612fc1a4d6f1f842c5e165860d56c3fd1076f498a898e18c...
record old: [748] 0200005f0302a48ed01c4dad612fc1a4d6f1f842c5e165860d56c3fd1076f498...
record new: [750] 020000610302a48ed01c4dad612fc1a4d6f1f842c5e165860d56c3fd1076f498...
server: Original packet: [753] 16030202ec0200005f0302a48ed01c4dad612fc1a4d6f1f842c5e165860d56c3...
server: Filtered packet: [755] 16030202ee020000610302a48ed01c4dad612fc1a4d6f1f842c5e165860d56c3...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 124
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 124
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 (47 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [6] 000401610162
handshake old: [95] 030372532576f3e003110f9d3e546baa40fd5cb7d227dd6cb3ac0620c772e3a6...
handshake new: [97] 030372532576f3e003110f9d3e546baa40fd5cb7d227dd6cb3ac0620c772e3a6...
record old: [750] 0200005f030372532576f3e003110f9d3e546baa40fd5cb7d227dd6cb3ac0620...
record new: [752] 02000061030372532576f3e003110f9d3e546baa40fd5cb7d227dd6cb3ac0620...
server: Original packet: [755] 16030302ee0200005f030372532576f3e003110f9d3e546baa40fd5cb7d227dd...
server: Filtered packet: [757] 16030302f002000061030372532576f3e003110f9d3e546baa40fd5cb7d227dd...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 (35 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0099016100
handshake old: [95] 0301d3355998cd185c0f5957559c7a776c0f22bf1be16e2d04c6a6ffbf56a7c4...
handshake new: [96] 0301d3355998cd185c0f5957559c7a776c0f22bf1be16e2d04c6a6ffbf56a7c4...
record old: [748] 0200005f0301d3355998cd185c0f5957559c7a776c0f22bf1be16e2d04c6a6ff...
record new: [749] 020000600301d3355998cd185c0f5957559c7a776c0f22bf1be16e2d04c6a6ff...
server: Original packet: [753] 16030102ec0200005f0301d3355998cd185c0f5957559c7a776c0f22bf1be16e...
server: Filtered packet: [754] 16030102ed020000600301d3355998cd185c0f5957559c7a776c0f22bf1be16e...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 126
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 (46 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0099016100
handshake old: [95] 0302f9dbf3db8a750310f9d66fcf0905e1c3720d953366e4601e6ee2c0860f43...
handshake new: [96] 0302f9dbf3db8a750310f9d66fcf0905e1c3720d953366e4601e6ee2c0860f43...
record old: [748] 0200005f0302f9dbf3db8a750310f9d66fcf0905e1c3720d953366e4601e6ee2...
record new: [749] 020000600302f9dbf3db8a750310f9d66fcf0905e1c3720d953366e4601e6ee2...
server: Original packet: [753] 16030202ec0200005f0302f9dbf3db8a750310f9d66fcf0905e1c3720d953366...
server: Filtered packet: [754] 16030202ed020000600302f9dbf3db8a750310f9d66fcf0905e1c3720d953366...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 (35 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0099016100
handshake old: [95] 0303ebc5b05ef914103cee823e7a2804d323fcad228f23cf41edac4e95853cd5...
handshake new: [96] 0303ebc5b05ef914103cee823e7a2804d323fcad228f23cf41edac4e95853cd5...
record old: [750] 0200005f0303ebc5b05ef914103cee823e7a2804d323fcad228f23cf41edac4e...
record new: [751] 020000600303ebc5b05ef914103cee823e7a2804d323fcad228f23cf41edac4e...
server: Original packet: [755] 16030302ee0200005f0303ebc5b05ef914103cee823e7a2804d323fcad228f23...
server: Filtered packet: [756] 16030302ef020000600303ebc5b05ef914103cee823e7a2804d323fcad228f23...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 128
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 128
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 (35 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [4] 00029961
handshake old: [95] 030157bfcb0aee28300b84da65a6b03da747204a5cdba9e402f23ea67dde2326...
handshake new: [95] 030157bfcb0aee28300b84da65a6b03da747204a5cdba9e402f23ea67dde2326...
record old: [748] 0200005f030157bfcb0aee28300b84da65a6b03da747204a5cdba9e402f23ea6...
record new: [748] 0200005f030157bfcb0aee28300b84da65a6b03da747204a5cdba9e402f23ea6...
server: Original packet: [753] 16030102ec0200005f030157bfcb0aee28300b84da65a6b03da747204a5cdba9...
server: Filtered packet: [753] 16030102ec0200005f030157bfcb0aee28300b84da65a6b03da747204a5cdba9...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 129
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 (45 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [4] 00029961
handshake old: [95] 0302d1c26bc547b4eb4bbfa50414371f6461f5961030ef4b76015d6f9539fef0...
handshake new: [95] 0302d1c26bc547b4eb4bbfa50414371f6461f5961030ef4b76015d6f9539fef0...
record old: [748] 0200005f0302d1c26bc547b4eb4bbfa50414371f6461f5961030ef4b76015d6f...
record new: [748] 0200005f0302d1c26bc547b4eb4bbfa50414371f6461f5961030ef4b76015d6f...
server: Original packet: [753] 16030202ec0200005f0302d1c26bc547b4eb4bbfa50414371f6461f5961030ef...
server: Filtered packet: [753] 16030202ec0200005f0302d1c26bc547b4eb4bbfa50414371f6461f5961030ef...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 130
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 (48 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [4] 00029961
handshake old: [95] 0303aa00e754a9f5d6c5b5cfe95d432952d5b85b516edc5444b8d123da532ed6...
handshake new: [95] 0303aa00e754a9f5d6c5b5cfe95d432952d5b85b516edc5444b8d123da532ed6...
record old: [750] 0200005f0303aa00e754a9f5d6c5b5cfe95d432952d5b85b516edc5444b8d123...
record new: [750] 0200005f0303aa00e754a9f5d6c5b5cfe95d432952d5b85b516edc5444b8d123...
server: Original packet: [755] 16030302ee0200005f0303aa00e754a9f5d6c5b5cfe95d432952d5b85b516edc...
server: Filtered packet: [755] 16030302ee0200005f0303aa00e754a9f5d6c5b5cfe95d432952d5b85b516edc...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 131
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 (36 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [1] 00
handshake old: [109] 030161c620bbd3ac3c72d07210a04c819c025a28d08e29450f398423849433ea...
handshake new: [108] 030161c620bbd3ac3c72d07210a04c819c025a28d08e29450f398423849433ea...
record old: [113] 0100006d030161c620bbd3ac3c72d07210a04c819c025a28d08e29450f398423...
record new: [112] 0100006c030161c620bbd3ac3c72d07210a04c819c025a28d08e29450f398423...
client: Original packet: [118] 16030100710100006d030161c620bbd3ac3c72d07210a04c819c025a28d08e29...
client: Filtered packet: [117] 16030100700100006c030161c620bbd3ac3c72d07210a04c819c025a28d08e29...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 132
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/0 (25 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [1] 00
handshake old: [109] 0302231df38dcf3667a2f01974f7e65d687b5ad73c27495524b4e936d40caf6b...
handshake new: [108] 0302231df38dcf3667a2f01974f7e65d687b5ad73c27495524b4e936d40caf6b...
record old: [113] 0100006d0302231df38dcf3667a2f01974f7e65d687b5ad73c27495524b4e936...
record new: [112] 0100006c0302231df38dcf3667a2f01974f7e65d687b5ad73c27495524b4e936...
client: Original packet: [118] 16030100710100006d0302231df38dcf3667a2f01974f7e65d687b5ad73c2749...
client: Filtered packet: [117] 16030100700100006c0302231df38dcf3667a2f01974f7e65d687b5ad73c2749...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 133
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/1 (24 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [1] 00
handshake old: [163] 0303f72f56f1d2afdc8f92ce13dcf17279d6d15e06d01549dd3c5b21b411c94d...
handshake new: [162] 0303f72f56f1d2afdc8f92ce13dcf17279d6d15e06d01549dd3c5b21b411c94d...
record old: [167] 010000a30303f72f56f1d2afdc8f92ce13dcf17279d6d15e06d01549dd3c5b21...
record new: [166] 010000a20303f72f56f1d2afdc8f92ce13dcf17279d6d15e06d01549dd3c5b21...
client: Original packet: [172] 16030100a7010000a30303f72f56f1d2afdc8f92ce13dcf17279d6d15e06d015...
client: Filtered packet: [171] 16030100a6010000a20303f72f56f1d2afdc8f92ce13dcf17279d6d15e06d015...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 133
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/2 (24 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 990000
handshake old: [109] 0301a093c763ae7efd75f25ce5de3bf258b46b898c28b32917ce0928b62c452a...
handshake new: [110] 0301a093c763ae7efd75f25ce5de3bf258b46b898c28b32917ce0928b62c452a...
record old: [113] 0100006d0301a093c763ae7efd75f25ce5de3bf258b46b898c28b32917ce0928...
record new: [114] 0100006e0301a093c763ae7efd75f25ce5de3bf258b46b898c28b32917ce0928...
client: Original packet: [118] 16030100710100006d0301a093c763ae7efd75f25ce5de3bf258b46b898c28b3...
client: Filtered packet: [119] 16030100720100006e0301a093c763ae7efd75f25ce5de3bf258b46b898c28b3...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 134
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/0 (24 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 990000
handshake old: [109] 0302b6ecf655cab46e954bc7c82ecba3e5a1acdf558fcc7392616188cb2be9ec...
handshake new: [110] 0302b6ecf655cab46e954bc7c82ecba3e5a1acdf558fcc7392616188cb2be9ec...
record old: [113] 0100006d0302b6ecf655cab46e954bc7c82ecba3e5a1acdf558fcc7392616188...
record new: [114] 0100006e0302b6ecf655cab46e954bc7c82ecba3e5a1acdf558fcc7392616188...
client: Original packet: [118] 16030100710100006d0302b6ecf655cab46e954bc7c82ecba3e5a1acdf558fcc...
client: Filtered packet: [119] 16030100720100006e0302b6ecf655cab46e954bc7c82ecba3e5a1acdf558fcc...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 135
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/1 (24 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 990000
handshake old: [163] 0303195646727aa673b19b806cff91d5b9d120f65dfa1f34d4156d4eb980c898...
handshake new: [164] 0303195646727aa673b19b806cff91d5b9d120f65dfa1f34d4156d4eb980c898...
record old: [167] 010000a30303195646727aa673b19b806cff91d5b9d120f65dfa1f34d4156d4e...
record new: [168] 010000a40303195646727aa673b19b806cff91d5b9d120f65dfa1f34d4156d4e...
client: Original packet: [172] 16030100a7010000a30303195646727aa673b19b806cff91d5b9d120f65dfa1f...
client: Filtered packet: [173] 16030100a8010000a40303195646727aa673b19b806cff91d5b9d120f65dfa1f...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 136
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/2 (24 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 010000
handshake old: [109] 030109e0d6241b644cb59b4fa931b9eeb4d6c3c685a4a378182b4c05932f617d...
handshake new: [110] 030109e0d6241b644cb59b4fa931b9eeb4d6c3c685a4a378182b4c05932f617d...
record old: [113] 0100006d030109e0d6241b644cb59b4fa931b9eeb4d6c3c685a4a378182b4c05...
record new: [114] 0100006e030109e0d6241b644cb59b4fa931b9eeb4d6c3c685a4a378182b4c05...
client: Original packet: [118] 16030100710100006d030109e0d6241b644cb59b4fa931b9eeb4d6c3c685a4a3...
client: Filtered packet: [119] 16030100720100006e030109e0d6241b644cb59b4fa931b9eeb4d6c3c685a4a3...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 137
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/0 (33 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 010000
handshake old: [109] 0302a5c4e9bae6517440457d8e8ddb222926a4cfce159b48a5d77afcba1ee3c4...
handshake new: [110] 0302a5c4e9bae6517440457d8e8ddb222926a4cfce159b48a5d77afcba1ee3c4...
record old: [113] 0100006d0302a5c4e9bae6517440457d8e8ddb222926a4cfce159b48a5d77afc...
record new: [114] 0100006e0302a5c4e9bae6517440457d8e8ddb222926a4cfce159b48a5d77afc...
client: Original packet: [118] 16030100710100006d0302a5c4e9bae6517440457d8e8ddb222926a4cfce159b...
client: Filtered packet: [119] 16030100720100006e0302a5c4e9bae6517440457d8e8ddb222926a4cfce159b...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 138
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/1 (30 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 010000
handshake old: [163] 03038876aae431254dd780d2549df0f35eeb7c10f52529a4f22bdcca0b717a5c...
handshake new: [164] 03038876aae431254dd780d2549df0f35eeb7c10f52529a4f22bdcca0b717a5c...
record old: [167] 010000a303038876aae431254dd780d2549df0f35eeb7c10f52529a4f22bdcca...
record new: [168] 010000a403038876aae431254dd780d2549df0f35eeb7c10f52529a4f22bdcca...
client: Original packet: [172] 16030100a7010000a303038876aae431254dd780d2549df0f35eeb7c10f52529...
client: Filtered packet: [173] 16030100a8010000a403038876aae431254dd780d2549df0f35eeb7c10f52529...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 139
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/2 (31 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [1] 99
handshake old: [109] 0301752801c55a8ed1a9eb3a9fa3e8810a91f9cd9bfd5a67bcfbacc562c98724...
handshake new: [109] 0301752801c55a8ed1a9eb3a9fa3e8810a91f9cd9bfd5a67bcfbacc562c98724...
record old: [113] 0100006d0301752801c55a8ed1a9eb3a9fa3e8810a91f9cd9bfd5a67bcfbacc5...
record new: [113] 0100006d0301752801c55a8ed1a9eb3a9fa3e8810a91f9cd9bfd5a67bcfbacc5...
client: Original packet: [118] 16030100710100006d0301752801c55a8ed1a9eb3a9fa3e8810a91f9cd9bfd5a...
client: Filtered packet: [118] 16030100710100006d0301752801c55a8ed1a9eb3a9fa3e8810a91f9cd9bfd5a...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 140
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 (30 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [1] 99
handshake old: [109] 0302fc2eac1d0a71db2fdee48f3d4b6c5c7e6a83be5f872e9040af70e15e2dd8...
handshake new: [109] 0302fc2eac1d0a71db2fdee48f3d4b6c5c7e6a83be5f872e9040af70e15e2dd8...
record old: [113] 0100006d0302fc2eac1d0a71db2fdee48f3d4b6c5c7e6a83be5f872e9040af70...
record new: [113] 0100006d0302fc2eac1d0a71db2fdee48f3d4b6c5c7e6a83be5f872e9040af70...
client: Original packet: [118] 16030100710100006d0302fc2eac1d0a71db2fdee48f3d4b6c5c7e6a83be5f87...
client: Filtered packet: [118] 16030100710100006d0302fc2eac1d0a71db2fdee48f3d4b6c5c7e6a83be5f87...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 141
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 (31 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [1] 99
handshake old: [163] 03039258ccb3e69ae7587135799a9c472671ecab423923ea0bf264be4b735e81...
handshake new: [163] 03039258ccb3e69ae7587135799a9c472671ecab423923ea0bf264be4b735e81...
record old: [167] 010000a303039258ccb3e69ae7587135799a9c472671ecab423923ea0bf264be...
record new: [167] 010000a303039258ccb3e69ae7587135799a9c472671ecab423923ea0bf264be...
client: Original packet: [172] 16030100a7010000a303039258ccb3e69ae7587135799a9c472671ecab423923...
client: Filtered packet: [172] 16030100a7010000a303039258ccb3e69ae7587135799a9c472671ecab423923...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 142
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 (31 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [2] 0100
handshake old: [109] 0301a20db0bece53abec40389f343e00be1f1bd0d1399a1b625e08f6d9acd528...
handshake new: [110] 0301a20db0bece53abec40389f343e00be1f1bd0d1399a1b625e08f6d9acd528...
record old: [113] 0100006d0301a20db0bece53abec40389f343e00be1f1bd0d1399a1b625e08f6...
record new: [114] 0100006e0301a20db0bece53abec40389f343e00be1f1bd0d1399a1b625e08f6...
client: Original packet: [118] 16030100710100006d0301a20db0bece53abec40389f343e00be1f1bd0d1399a...
client: Filtered packet: [119] 16030100720100006e0301a20db0bece53abec40389f343e00be1f1bd0d1399a...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 143
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 (24 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [2] 0100
handshake old: [109] 030231265f5a676057d135111a10df01e58fc324da73e633f6ca5105b1924aa7...
handshake new: [110] 030231265f5a676057d135111a10df01e58fc324da73e633f6ca5105b1924aa7...
record old: [113] 0100006d030231265f5a676057d135111a10df01e58fc324da73e633f6ca5105...
record new: [114] 0100006e030231265f5a676057d135111a10df01e58fc324da73e633f6ca5105...
client: Original packet: [118] 16030100710100006d030231265f5a676057d135111a10df01e58fc324da73e6...
client: Filtered packet: [119] 16030100720100006e030231265f5a676057d135111a10df01e58fc324da73e6...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 144
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 (33 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [2] 0100
handshake old: [163] 0303f8d40d5df681242fa04f40b59205d2a2443899c6b4dc403e36c5ae5e9cfd...
handshake new: [164] 0303f8d40d5df681242fa04f40b59205d2a2443899c6b4dc403e36c5ae5e9cfd...
record old: [167] 010000a30303f8d40d5df681242fa04f40b59205d2a2443899c6b4dc403e36c5...
record new: [168] 010000a40303f8d40d5df681242fa04f40b59205d2a2443899c6b4dc403e36c5...
client: Original packet: [172] 16030100a7010000a30303f8d40d5df681242fa04f40b59205d2a2443899c6b4...
client: Filtered packet: [173] 16030100a8010000a40303f8d40d5df681242fa04f40b59205d2a2443899c6b4...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 145
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 (28 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [0] 
handshake old: [109] 03016065000bb6270c3c8f744c3c2e3138faa54aba567d56948459c90ecaa5ae...
handshake new: [108] 03016065000bb6270c3c8f744c3c2e3138faa54aba567d56948459c90ecaa5ae...
record old: [113] 0100006d03016065000bb6270c3c8f744c3c2e3138faa54aba567d56948459c9...
record new: [112] 0100006c03016065000bb6270c3c8f744c3c2e3138faa54aba567d56948459c9...
client: Original packet: [118] 16030100710100006d03016065000bb6270c3c8f744c3c2e3138faa54aba567d...
client: Filtered packet: [117] 16030100700100006c03016065000bb6270c3c8f744c3c2e3138faa54aba567d...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 146
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 (24 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [0] 
handshake old: [109] 0302e6dd2aa7d8b1e32e9aaa59bf3a0b0695d6f9ef837af565458a9c2b284b8f...
handshake new: [108] 0302e6dd2aa7d8b1e32e9aaa59bf3a0b0695d6f9ef837af565458a9c2b284b8f...
record old: [113] 0100006d0302e6dd2aa7d8b1e32e9aaa59bf3a0b0695d6f9ef837af565458a9c...
record new: [112] 0100006c0302e6dd2aa7d8b1e32e9aaa59bf3a0b0695d6f9ef837af565458a9c...
client: Original packet: [118] 16030100710100006d0302e6dd2aa7d8b1e32e9aaa59bf3a0b0695d6f9ef837a...
client: Filtered packet: [117] 16030100700100006c0302e6dd2aa7d8b1e32e9aaa59bf3a0b0695d6f9ef837a...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 147
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 (35 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [0] 
handshake old: [163] 0303fcdbb73a9fa34ff9e483aaaefb9b125199ad89ab0169ca60df40556b38b9...
handshake new: [162] 0303fcdbb73a9fa34ff9e483aaaefb9b125199ad89ab0169ca60df40556b38b9...
record old: [167] 010000a30303fcdbb73a9fa34ff9e483aaaefb9b125199ad89ab0169ca60df40...
record new: [166] 010000a20303fcdbb73a9fa34ff9e483aaaefb9b125199ad89ab0169ca60df40...
client: Original packet: [172] 16030100a7010000a30303fcdbb73a9fa34ff9e483aaaefb9b125199ad89ab01...
client: Filtered packet: [171] 16030100a6010000a20303fcdbb73a9fa34ff9e483aaaefb9b125199ad89ab01...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 147
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 (28 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 148
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/0 (77 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 149
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 149
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/1 (77 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 150
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 150
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/2 (77 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 151
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 151
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/0 (77 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 151
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/1 (78 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 151
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/2 (76 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 151
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/0 (77 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 151
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/1 (77 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 152
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/2 (76 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 152
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/0 (76 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 152
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/1 (82 ms)
[ RUN      ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 152
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 150
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/2 (78 ms)
[----------] 48 tests from ExtensionPre13Stream/TlsExtensionTestPre13 (2171 ms total)

[----------] 64 tests from ExtensionPre13Datagram/TlsExtensionTestPre13
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [2] 0000
handshake old: [95] 03023eb6edff92064c57f862d90e2750590d1b8286d85d9404eab2e9e24432dd...
handshake new: [93] 03023eb6edff92064c57f862d90e2750590d1b8286d85d9404eab2e9e24432dd...
record old: [748] 0200005f03023eb6edff92064c57f862d90e2750590d1b8286d85d9404eab2e9...
record new: [746] 0200005d03023eb6edff92064c57f862d90e2750590d1b8286d85d9404eab2e9...
server: Original packet: [753] 16030202ec0200005f03023eb6edff92064c57f862d90e2750590d1b8286d85d...
server: Filtered packet: [751] 16030202ea0200005d03023eb6edff92064c57f862d90e2750590d1b8286d85d...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 150
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 (52 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [2] 0000
handshake old: [95] 030393fb24067d4a1aa6eb2a01b033d3fdc1bcc1d744256d0dcfd044559ea4ea...
handshake new: [93] 030393fb24067d4a1aa6eb2a01b033d3fdc1bcc1d744256d0dcfd044559ea4ea...
record old: [750] 0200005f030393fb24067d4a1aa6eb2a01b033d3fdc1bcc1d744256d0dcfd044...
record new: [748] 0200005d030393fb24067d4a1aa6eb2a01b033d3fdc1bcc1d744256d0dcfd044...
server: Original packet: [755] 16030302ee0200005f030393fb24067d4a1aa6eb2a01b033d3fdc1bcc1d74425...
server: Filtered packet: [753] 16030302ec0200005d030393fb24067d4a1aa6eb2a01b033d3fdc1bcc1d74425...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 149
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 (57 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [2] 0000
handshake old: [95] feff3cc8cc86f21df1eb5329190b5e841d600b636094cc6ac8afad8b88f919ca...
handshake new: [93] feff3cc8cc86f21df1eb5329190b5e841d600b636094cc6ac8afad8b88f919ca...
record old: [107] 0200005f000000000000005ffeff3cc8cc86f21df1eb5329190b5e841d600b63...
record new: [105] 0200005d000000000000005dfeff3cc8cc86f21df1eb5329190b5e841d600b63...
server: Original packet: [832] 16feff0000000000000000006b0200005f000000000000005ffeff3cc8cc86f2...
server: Filtered packet: [830] 16feff000000000000000000690200005d000000000000005dfeff3cc8cc86f2...
server: Would have blocked
Poll() waiters = 2 timers = 150
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 (36 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [2] 0000
handshake old: [95] fefdeecda1bcad3343af0db55c5b7647eab7c778c8babe431a36c3973ade7154...
handshake new: [93] fefdeecda1bcad3343af0db55c5b7647eab7c778c8babe431a36c3973ade7154...
record old: [107] 0200005f000000000000005ffefdeecda1bcad3343af0db55c5b7647eab7c778...
record new: [105] 0200005d000000000000005dfefdeecda1bcad3343af0db55c5b7647eab7c778...
server: Original packet: [834] 16fefd0000000000000000006b0200005f000000000000005ffefdeecda1bcad...
server: Filtered packet: [832] 16fefd000000000000000000690200005d000000000000005dfefdeecda1bcad...
server: Would have blocked
Poll() waiters = 2 timers = 151
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 147
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/3 (60 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [3] 000100
handshake old: [95] 03021e0804802e4a28fdd996c27c5f97e67fad184fa6a5daa40065c865a004da...
handshake new: [94] 03021e0804802e4a28fdd996c27c5f97e67fad184fa6a5daa40065c865a004da...
record old: [748] 0200005f03021e0804802e4a28fdd996c27c5f97e67fad184fa6a5daa40065c8...
record new: [747] 0200005e03021e0804802e4a28fdd996c27c5f97e67fad184fa6a5daa40065c8...
server: Original packet: [753] 16030202ec0200005f03021e0804802e4a28fdd996c27c5f97e67fad184fa6a5...
server: Filtered packet: [752] 16030202eb0200005e03021e0804802e4a28fdd996c27c5f97e67fad184fa6a5...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 (41 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [3] 000100
handshake old: [95] 0303efbfd6391c7cc1fd0af28d49f2bb8693bee874a901e454c1d61ffc307b24...
handshake new: [94] 0303efbfd6391c7cc1fd0af28d49f2bb8693bee874a901e454c1d61ffc307b24...
record old: [750] 0200005f0303efbfd6391c7cc1fd0af28d49f2bb8693bee874a901e454c1d61f...
record new: [749] 0200005e0303efbfd6391c7cc1fd0af28d49f2bb8693bee874a901e454c1d61f...
server: Original packet: [755] 16030302ee0200005f0303efbfd6391c7cc1fd0af28d49f2bb8693bee874a901...
server: Filtered packet: [754] 16030302ed0200005e0303efbfd6391c7cc1fd0af28d49f2bb8693bee874a901...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 (40 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [3] 000100
handshake old: [95] feff9ef9a5123f8a2a5444aff1dcdecd52f5d9539e328e0013ebb62f28678944...
handshake new: [94] feff9ef9a5123f8a2a5444aff1dcdecd52f5d9539e328e0013ebb62f28678944...
record old: [107] 0200005f000000000000005ffeff9ef9a5123f8a2a5444aff1dcdecd52f5d953...
record new: [106] 0200005e000000000000005efeff9ef9a5123f8a2a5444aff1dcdecd52f5d953...
server: Original packet: [832] 16feff0000000000000000006b0200005f000000000000005ffeff9ef9a5123f...
server: Filtered packet: [831] 16feff0000000000000000006a0200005e000000000000005efeff9ef9a5123f...
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 145
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 (36 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [3] 000100
handshake old: [95] fefd38ab5f10262cddb731a8bc54309ec61a699c186891adfc2c959c221eb843...
handshake new: [94] fefd38ab5f10262cddb731a8bc54309ec61a699c186891adfc2c959c221eb843...
record old: [107] 0200005f000000000000005ffefd38ab5f10262cddb731a8bc54309ec61a699c...
record new: [106] 0200005e000000000000005efefd38ab5f10262cddb731a8bc54309ec61a699c...
server: Original packet: [834] 16fefd0000000000000000006b0200005f000000000000005ffefd38ab5f1026...
server: Filtered packet: [833] 16fefd0000000000000000006a0200005e000000000000005efefd38ab5f1026...
server: Would have blocked
Poll() waiters = 2 timers = 148
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/3 (35 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0002016100
handshake old: [95] 0302a0b93956ea1f06f58a213f295a9a385339033b60c22b04d74b3889701287...
handshake new: [96] 0302a0b93956ea1f06f58a213f295a9a385339033b60c22b04d74b3889701287...
record old: [748] 0200005f0302a0b93956ea1f06f58a213f295a9a385339033b60c22b04d74b38...
record new: [749] 020000600302a0b93956ea1f06f58a213f295a9a385339033b60c22b04d74b38...
server: Original packet: [753] 16030202ec0200005f0302a0b93956ea1f06f58a213f295a9a385339033b60c2...
server: Filtered packet: [754] 16030202ed020000600302a0b93956ea1f06f58a213f295a9a385339033b60c2...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 147
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 144
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 (38 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0002016100
handshake old: [95] 0303662c57b44c1587f31a10ef7145d46272586b9eb8b4c42595340f40865398...
handshake new: [96] 0303662c57b44c1587f31a10ef7145d46272586b9eb8b4c42595340f40865398...
record old: [750] 0200005f0303662c57b44c1587f31a10ef7145d46272586b9eb8b4c42595340f...
record new: [751] 020000600303662c57b44c1587f31a10ef7145d46272586b9eb8b4c42595340f...
server: Original packet: [755] 16030302ee0200005f0303662c57b44c1587f31a10ef7145d46272586b9eb8b4...
server: Filtered packet: [756] 16030302ef020000600303662c57b44c1587f31a10ef7145d46272586b9eb8b4...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 141
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 (41 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0002016100
handshake old: [95] feff392250a65aab58244dbdd4c8a0acd7f4e3c41540a319b3cfe41d770e199b...
handshake new: [96] feff392250a65aab58244dbdd4c8a0acd7f4e3c41540a319b3cfe41d770e199b...
record old: [107] 0200005f000000000000005ffeff392250a65aab58244dbdd4c8a0acd7f4e3c4...
record new: [108] 020000600000000000000060feff392250a65aab58244dbdd4c8a0acd7f4e3c4...
server: Original packet: [832] 16feff0000000000000000006b0200005f000000000000005ffeff392250a65a...
server: Filtered packet: [833] 16feff0000000000000000006c020000600000000000000060feff392250a65a...
server: Would have blocked
Poll() waiters = 2 timers = 144
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 (37 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0002016100
handshake old: [95] fefdc5215308e2657b756e578f42b21de74672e753a825a26826561db2e9ded1...
handshake new: [96] fefdc5215308e2657b756e578f42b21de74672e753a825a26826561db2e9ded1...
record old: [107] 0200005f000000000000005ffefdc5215308e2657b756e578f42b21de74672e7...
record new: [108] 020000600000000000000060fefdc5215308e2657b756e578f42b21de74672e7...
server: Original packet: [834] 16fefd0000000000000000006b0200005f000000000000005ffefdc5215308e2...
server: Filtered packet: [835] 16fefd0000000000000000006c020000600000000000000060fefdc5215308e2...
server: Would have blocked
Poll() waiters = 2 timers = 146
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/3 (38 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [6] 000401610162
handshake old: [95] 030203ae824be0d4de24b5a2f72f7a0aaed08da42c05ec30e8446188bcf0aa26...
handshake new: [97] 030203ae824be0d4de24b5a2f72f7a0aaed08da42c05ec30e8446188bcf0aa26...
record old: [748] 0200005f030203ae824be0d4de24b5a2f72f7a0aaed08da42c05ec30e8446188...
record new: [750] 02000061030203ae824be0d4de24b5a2f72f7a0aaed08da42c05ec30e8446188...
server: Original packet: [753] 16030202ec0200005f030203ae824be0d4de24b5a2f72f7a0aaed08da42c05ec...
server: Filtered packet: [755] 16030202ee02000061030203ae824be0d4de24b5a2f72f7a0aaed08da42c05ec...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 141
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 (37 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [6] 000401610162
handshake old: [95] 030303d844d8c4eef8caca8d25d2cfc747c0f321ee3887ed386fc781af1802f3...
handshake new: [97] 030303d844d8c4eef8caca8d25d2cfc747c0f321ee3887ed386fc781af1802f3...
record old: [750] 0200005f030303d844d8c4eef8caca8d25d2cfc747c0f321ee3887ed386fc781...
record new: [752] 02000061030303d844d8c4eef8caca8d25d2cfc747c0f321ee3887ed386fc781...
server: Original packet: [755] 16030302ee0200005f030303d844d8c4eef8caca8d25d2cfc747c0f321ee3887...
server: Filtered packet: [757] 16030302f002000061030303d844d8c4eef8caca8d25d2cfc747c0f321ee3887...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 140
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 (38 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [6] 000401610162
handshake old: [95] feff22c5816d80b7ca2a7efa7a26bdb091537291cc15000667ee7a800e896657...
handshake new: [97] feff22c5816d80b7ca2a7efa7a26bdb091537291cc15000667ee7a800e896657...
record old: [107] 0200005f000000000000005ffeff22c5816d80b7ca2a7efa7a26bdb091537291...
record new: [109] 020000610000000000000061feff22c5816d80b7ca2a7efa7a26bdb091537291...
server: Original packet: [832] 16feff0000000000000000006b0200005f000000000000005ffeff22c5816d80...
server: Filtered packet: [834] 16feff0000000000000000006d020000610000000000000061feff22c5816d80...
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 (37 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [6] 000401610162
handshake old: [95] fefdf770cf9886039333952c770a64d6b97f54c551867e8d9993d8e49e0fb6de...
handshake new: [97] fefdf770cf9886039333952c770a64d6b97f54c551867e8d9993d8e49e0fb6de...
record old: [107] 0200005f000000000000005ffefdf770cf9886039333952c770a64d6b97f54c5...
record new: [109] 020000610000000000000061fefdf770cf9886039333952c770a64d6b97f54c5...
server: Original packet: [834] 16fefd0000000000000000006b0200005f000000000000005ffefdf770cf9886...
server: Filtered packet: [836] 16fefd0000000000000000006d020000610000000000000061fefdf770cf9886...
server: Would have blocked
Poll() waiters = 2 timers = 145
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 143
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/3 (37 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0099016100
handshake old: [95] 0302a8783628188270488945cd1c4f99165843cefdb14bd69108e9393b43ef3b...
handshake new: [96] 0302a8783628188270488945cd1c4f99165843cefdb14bd69108e9393b43ef3b...
record old: [748] 0200005f0302a8783628188270488945cd1c4f99165843cefdb14bd69108e939...
record new: [749] 020000600302a8783628188270488945cd1c4f99165843cefdb14bd69108e939...
server: Original packet: [753] 16030202ec0200005f0302a8783628188270488945cd1c4f99165843cefdb14b...
server: Filtered packet: [754] 16030202ed020000600302a8783628188270488945cd1c4f99165843cefdb14b...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 144
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 (37 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0099016100
handshake old: [95] 0303b728261f158473e5d10dc5b9e1cc32ea9e1d810beacba9fb5e35f1d278ef...
handshake new: [96] 0303b728261f158473e5d10dc5b9e1cc32ea9e1d810beacba9fb5e35f1d278ef...
record old: [750] 0200005f0303b728261f158473e5d10dc5b9e1cc32ea9e1d810beacba9fb5e35...
record new: [751] 020000600303b728261f158473e5d10dc5b9e1cc32ea9e1d810beacba9fb5e35...
server: Original packet: [755] 16030302ee0200005f0303b728261f158473e5d10dc5b9e1cc32ea9e1d810bea...
server: Filtered packet: [756] 16030302ef020000600303b728261f158473e5d10dc5b9e1cc32ea9e1d810bea...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 (37 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0099016100
handshake old: [95] feffc20f58e0462fd1f64b50534a0fc6f739c8fad0867f8002b27a6f882702b7...
handshake new: [96] feffc20f58e0462fd1f64b50534a0fc6f739c8fad0867f8002b27a6f882702b7...
record old: [107] 0200005f000000000000005ffeffc20f58e0462fd1f64b50534a0fc6f739c8fa...
record new: [108] 020000600000000000000060feffc20f58e0462fd1f64b50534a0fc6f739c8fa...
server: Original packet: [832] 16feff0000000000000000006b0200005f000000000000005ffeffc20f58e046...
server: Filtered packet: [833] 16feff0000000000000000006c020000600000000000000060feffc20f58e046...
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 (37 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [5] 0099016100
handshake old: [95] fefd84712e49026ab049dfd53964ebb0f67f41fe670500b2a138ec2e03f68f03...
handshake new: [96] fefd84712e49026ab049dfd53964ebb0f67f41fe670500b2a138ec2e03f68f03...
record old: [107] 0200005f000000000000005ffefd84712e49026ab049dfd53964ebb0f67f41fe...
record new: [108] 020000600000000000000060fefd84712e49026ab049dfd53964ebb0f67f41fe...
server: Original packet: [834] 16fefd0000000000000000006b0200005f000000000000005ffefd84712e4902...
server: Filtered packet: [835] 16fefd0000000000000000006c020000600000000000000060fefd84712e4902...
server: Would have blocked
Poll() waiters = 2 timers = 144
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/3 (38 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [4] 00029961
handshake old: [95] 0302481001c5269635cb756f4a09624d7f2b9d3c61b372a53226b94d13c30ea9...
handshake new: [95] 0302481001c5269635cb756f4a09624d7f2b9d3c61b372a53226b94d13c30ea9...
record old: [748] 0200005f0302481001c5269635cb756f4a09624d7f2b9d3c61b372a53226b94d...
record new: [748] 0200005f0302481001c5269635cb756f4a09624d7f2b9d3c61b372a53226b94d...
server: Original packet: [753] 16030202ec0200005f0302481001c5269635cb756f4a09624d7f2b9d3c61b372...
server: Filtered packet: [753] 16030202ec0200005f0302481001c5269635cb756f4a09624d7f2b9d3c61b372...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 141
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 (36 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [4] 00029961
handshake old: [95] 03038fd3f5c29daf800826d313629ae5495267f07ac5955e4791a3ab6a2fd363...
handshake new: [95] 03038fd3f5c29daf800826d313629ae5495267f07ac5955e4791a3ab6a2fd363...
record old: [750] 0200005f03038fd3f5c29daf800826d313629ae5495267f07ac5955e4791a3ab...
record new: [750] 0200005f03038fd3f5c29daf800826d313629ae5495267f07ac5955e4791a3ab...
server: Original packet: [755] 16030302ee0200005f03038fd3f5c29daf800826d313629ae5495267f07ac595...
server: Filtered packet: [755] 16030302ee0200005f03038fd3f5c29daf800826d313629ae5495267f07ac595...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 142
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 138
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 (42 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [4] 00029961
handshake old: [95] feff8d5c9a3ac0fbfb689abc215f14bbe96bf753a9e9e7a7dc2809d22981ff5b...
handshake new: [95] feff8d5c9a3ac0fbfb689abc215f14bbe96bf753a9e9e7a7dc2809d22981ff5b...
record old: [107] 0200005f000000000000005ffeff8d5c9a3ac0fbfb689abc215f14bbe96bf753...
record new: [107] 0200005f000000000000005ffeff8d5c9a3ac0fbfb689abc215f14bbe96bf753...
server: Original packet: [832] 16feff0000000000000000006b0200005f000000000000005ffeff8d5c9a3ac0...
server: Filtered packet: [832] 16feff0000000000000000006b0200005f000000000000005ffeff8d5c9a3ac0...
server: Would have blocked
Poll() waiters = 2 timers = 141
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 140
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 (38 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
extension old: [4] 00020161
extension new: [4] 00029961
handshake old: [95] fefdc3e85b927b84fa2380ae428002dd5d3bd5f59ee97ac7e08c77349580955a...
handshake new: [95] fefdc3e85b927b84fa2380ae428002dd5d3bd5f59ee97ac7e08c77349580955a...
record old: [107] 0200005f000000000000005ffefdc3e85b927b84fa2380ae428002dd5d3bd5f5...
record new: [107] 0200005f000000000000005ffefdc3e85b927b84fa2380ae428002dd5d3bd5f5...
server: Original packet: [834] 16fefd0000000000000000006b0200005f000000000000005ffefdc3e85b927b...
server: Filtered packet: [834] 16fefd0000000000000000006b0200005f000000000000005ffefdc3e85b927b...
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
Alert: [2] 0232
client: Handshake failed with SSL error 116: SSL received invalid NPN extension data.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
server: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/3 (38 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [1] 00
handshake old: [109] 030208f533bfa1cc156904e71a8a60427d331c4543ebc88cd34b1aa2712a1d0b...
handshake new: [108] 030208f533bfa1cc156904e71a8a60427d331c4543ebc88cd34b1aa2712a1d0b...
record old: [113] 0100006d030208f533bfa1cc156904e71a8a60427d331c4543ebc88cd34b1aa2...
record new: [112] 0100006c030208f533bfa1cc156904e71a8a60427d331c4543ebc88cd34b1aa2...
client: Original packet: [118] 16030100710100006d030208f533bfa1cc156904e71a8a60427d331c4543ebc8...
client: Filtered packet: [117] 16030100700100006c030208f533bfa1cc156904e71a8a60427d331c4543ebc8...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 142
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/0 (26 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [1] 00
handshake old: [163] 0303cfe903c38166f6b30678e244fc44265ec1516cc38b3b84ac2b3814e78539...
handshake new: [162] 0303cfe903c38166f6b30678e244fc44265ec1516cc38b3b84ac2b3814e78539...
record old: [167] 010000a30303cfe903c38166f6b30678e244fc44265ec1516cc38b3b84ac2b38...
record new: [166] 010000a20303cfe903c38166f6b30678e244fc44265ec1516cc38b3b84ac2b38...
client: Original packet: [172] 16030100a7010000a30303cfe903c38166f6b30678e244fc44265ec1516cc38b...
client: Filtered packet: [171] 16030100a6010000a20303cfe903c38166f6b30678e244fc44265ec1516cc38b...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 141
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/1 (26 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [1] 00
handshake old: [106] feff08599359e03b485257c30bb517462290dc3b75ff5a2955a9d63fdc8d5a27...
handshake new: [105] feff08599359e03b485257c30bb517462290dc3b75ff5a2955a9d63fdc8d5a27...
record old: [118] 0100006a000000000000006afeff08599359e03b485257c30bb517462290dc3b...
record new: [117] 010000690000000000000069feff08599359e03b485257c30bb517462290dc3b...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeff08599359e0...
client: Filtered packet: [130] 16feff00000000000000000075010000690000000000000069feff08599359e0...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 140
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/2 (26 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [1] 00
handshake old: [160] fefd35ba994687f82a5fd562ca9d78cfb6e2feeb6644489055dd85234a611cc0...
handshake new: [159] fefd35ba994687f82a5fd562ca9d78cfb6e2feeb6644489055dd85234a611cc0...
record old: [172] 010000a000000000000000a0fefd35ba994687f82a5fd562ca9d78cfb6e2feeb...
record new: [171] 0100009f000000000000009ffefd35ba994687f82a5fd562ca9d78cfb6e2feeb...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd35ba994687...
client: Filtered packet: [184] 16fefd000000000000000000ab0100009f000000000000009ffefd35ba994687...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 141
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/3 (26 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 990000
handshake old: [109] 03025ad9d8102e4c72fb2c434fe617cb3225b5e34125a38c05bb3e76e5697a05...
handshake new: [110] 03025ad9d8102e4c72fb2c434fe617cb3225b5e34125a38c05bb3e76e5697a05...
record old: [113] 0100006d03025ad9d8102e4c72fb2c434fe617cb3225b5e34125a38c05bb3e76...
record new: [114] 0100006e03025ad9d8102e4c72fb2c434fe617cb3225b5e34125a38c05bb3e76...
client: Original packet: [118] 16030100710100006d03025ad9d8102e4c72fb2c434fe617cb3225b5e34125a3...
client: Filtered packet: [119] 16030100720100006e03025ad9d8102e4c72fb2c434fe617cb3225b5e34125a3...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 142
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/0 (26 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 990000
handshake old: [163] 030377d201dcdd087fd117af35dcb211057930958336e82e6b1f926310ba8e0f...
handshake new: [164] 030377d201dcdd087fd117af35dcb211057930958336e82e6b1f926310ba8e0f...
record old: [167] 010000a3030377d201dcdd087fd117af35dcb211057930958336e82e6b1f9263...
record new: [168] 010000a4030377d201dcdd087fd117af35dcb211057930958336e82e6b1f9263...
client: Original packet: [172] 16030100a7010000a3030377d201dcdd087fd117af35dcb211057930958336e8...
client: Filtered packet: [173] 16030100a8010000a4030377d201dcdd087fd117af35dcb211057930958336e8...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 141
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/1 (26 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 990000
handshake old: [106] feff3bbd93566e079754bab934d31f90e33af15b5380fd2ef28cb54c5cd792b2...
handshake new: [107] feff3bbd93566e079754bab934d31f90e33af15b5380fd2ef28cb54c5cd792b2...
record old: [118] 0100006a000000000000006afeff3bbd93566e079754bab934d31f90e33af15b...
record new: [119] 0100006b000000000000006bfeff3bbd93566e079754bab934d31f90e33af15b...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeff3bbd93566e...
client: Filtered packet: [132] 16feff000000000000000000770100006b000000000000006bfeff3bbd93566e...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 141
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/2 (26 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 990000
handshake old: [160] fefd587085a6cf303d9fb5445a7dfbde8fe02b2ec6e918bf5561c01b43e7baac...
handshake new: [161] fefd587085a6cf303d9fb5445a7dfbde8fe02b2ec6e918bf5561c01b43e7baac...
record old: [172] 010000a000000000000000a0fefd587085a6cf303d9fb5445a7dfbde8fe02b2e...
record new: [173] 010000a100000000000000a1fefd587085a6cf303d9fb5445a7dfbde8fe02b2e...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd587085a6cf...
client: Filtered packet: [186] 16fefd000000000000000000ad010000a100000000000000a1fefd587085a6cf...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 142
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/3 (26 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 010000
handshake old: [109] 0302c5f3a82c0293310ba28886a37d39cfdbc1a8434a699c3ec9d99a18daa647...
handshake new: [110] 0302c5f3a82c0293310ba28886a37d39cfdbc1a8434a699c3ec9d99a18daa647...
record old: [113] 0100006d0302c5f3a82c0293310ba28886a37d39cfdbc1a8434a699c3ec9d99a...
record new: [114] 0100006e0302c5f3a82c0293310ba28886a37d39cfdbc1a8434a699c3ec9d99a...
client: Original packet: [118] 16030100710100006d0302c5f3a82c0293310ba28886a37d39cfdbc1a8434a69...
client: Filtered packet: [119] 16030100720100006e0302c5f3a82c0293310ba28886a37d39cfdbc1a8434a69...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 142
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/0 (26 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 010000
handshake old: [163] 0303744fdb3f006b1535de97073b39f3851288d5d5c8eb3f3b5debd7ab722909...
handshake new: [164] 0303744fdb3f006b1535de97073b39f3851288d5d5c8eb3f3b5debd7ab722909...
record old: [167] 010000a30303744fdb3f006b1535de97073b39f3851288d5d5c8eb3f3b5debd7...
record new: [168] 010000a40303744fdb3f006b1535de97073b39f3851288d5d5c8eb3f3b5debd7...
client: Original packet: [172] 16030100a7010000a30303744fdb3f006b1535de97073b39f3851288d5d5c8eb...
client: Filtered packet: [173] 16030100a8010000a40303744fdb3f006b1535de97073b39f3851288d5d5c8eb...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 141
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/1 (26 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 010000
handshake old: [106] feffc7b10f6610e45a6eccb678f0ab47f0b08707a4f23aa560a9763730a08b5a...
handshake new: [107] feffc7b10f6610e45a6eccb678f0ab47f0b08707a4f23aa560a9763730a08b5a...
record old: [118] 0100006a000000000000006afeffc7b10f6610e45a6eccb678f0ab47f0b08707...
record new: [119] 0100006b000000000000006bfeffc7b10f6610e45a6eccb678f0ab47f0b08707...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeffc7b10f6610...
client: Filtered packet: [132] 16feff000000000000000000770100006b000000000000006bfeffc7b10f6610...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 142
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/2 (26 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [2] 0100
extension new: [3] 010000
handshake old: [160] fefdcafe631f40af013b2399bf2d5d601bfe715130242a51f0f720fd7792b6b4...
handshake new: [161] fefdcafe631f40af013b2399bf2d5d601bfe715130242a51f0f720fd7792b6b4...
record old: [172] 010000a000000000000000a0fefdcafe631f40af013b2399bf2d5d601bfe7151...
record new: [173] 010000a100000000000000a1fefdcafe631f40af013b2399bf2d5d601bfe7151...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefdcafe631f40...
client: Filtered packet: [186] 16fefd000000000000000000ad010000a100000000000000a1fefdcafe631f40...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 143
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/3 (26 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [1] 99
handshake old: [109] 0302435cc4fabe8a7c9a69907d6d248bd9d3ea1535e958b13c70e9822f90dd0f...
handshake new: [109] 0302435cc4fabe8a7c9a69907d6d248bd9d3ea1535e958b13c70e9822f90dd0f...
record old: [113] 0100006d0302435cc4fabe8a7c9a69907d6d248bd9d3ea1535e958b13c70e982...
record new: [113] 0100006d0302435cc4fabe8a7c9a69907d6d248bd9d3ea1535e958b13c70e982...
client: Original packet: [118] 16030100710100006d0302435cc4fabe8a7c9a69907d6d248bd9d3ea1535e958...
client: Filtered packet: [118] 16030100710100006d0302435cc4fabe8a7c9a69907d6d248bd9d3ea1535e958...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 142
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 (25 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [1] 99
handshake old: [163] 03032805dce3843af7ccf6a460a71270782cc4e6a719d2e5b1bb96424756ffcc...
handshake new: [163] 03032805dce3843af7ccf6a460a71270782cc4e6a719d2e5b1bb96424756ffcc...
record old: [167] 010000a303032805dce3843af7ccf6a460a71270782cc4e6a719d2e5b1bb9642...
record new: [167] 010000a303032805dce3843af7ccf6a460a71270782cc4e6a719d2e5b1bb9642...
client: Original packet: [172] 16030100a7010000a303032805dce3843af7ccf6a460a71270782cc4e6a719d2...
client: Filtered packet: [172] 16030100a7010000a303032805dce3843af7ccf6a460a71270782cc4e6a719d2...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 141
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 (24 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [1] 99
handshake old: [106] feff5d215173b551389600d63a87e256ab3efc3edcb97dc43092f7663872e143...
handshake new: [106] feff5d215173b551389600d63a87e256ab3efc3edcb97dc43092f7663872e143...
record old: [118] 0100006a000000000000006afeff5d215173b551389600d63a87e256ab3efc3e...
record new: [118] 0100006a000000000000006afeff5d215173b551389600d63a87e256ab3efc3e...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeff5d215173b5...
client: Filtered packet: [131] 16feff000000000000000000760100006a000000000000006afeff5d215173b5...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 141
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 (24 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [1] 99
handshake old: [160] fefd1dd466cc5dd9e921a0544ebd712631c5c47d5f8a18363cfd75f2c2e560d5...
handshake new: [160] fefd1dd466cc5dd9e921a0544ebd712631c5c47d5f8a18363cfd75f2c2e560d5...
record old: [172] 010000a000000000000000a0fefd1dd466cc5dd9e921a0544ebd712631c5c47d...
record new: [172] 010000a000000000000000a0fefd1dd466cc5dd9e921a0544ebd712631c5c47d...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd1dd466cc5d...
client: Filtered packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd1dd466cc5d...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 142
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/3 (31 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [2] 0100
handshake old: [109] 030287467ac0c3a326957b5d464780de0a3c83e141771ac1d59f018ee6780fd3...
handshake new: [110] 030287467ac0c3a326957b5d464780de0a3c83e141771ac1d59f018ee6780fd3...
record old: [113] 0100006d030287467ac0c3a326957b5d464780de0a3c83e141771ac1d59f018e...
record new: [114] 0100006e030287467ac0c3a326957b5d464780de0a3c83e141771ac1d59f018e...
client: Original packet: [118] 16030100710100006d030287467ac0c3a326957b5d464780de0a3c83e141771a...
client: Filtered packet: [119] 16030100720100006e030287467ac0c3a326957b5d464780de0a3c83e141771a...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 143
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 (29 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [2] 0100
handshake old: [163] 030373639315ac2ce319aaae55042de423b89201afe75a8a5a6ce7c153d42c54...
handshake new: [164] 030373639315ac2ce319aaae55042de423b89201afe75a8a5a6ce7c153d42c54...
record old: [167] 010000a3030373639315ac2ce319aaae55042de423b89201afe75a8a5a6ce7c1...
record new: [168] 010000a4030373639315ac2ce319aaae55042de423b89201afe75a8a5a6ce7c1...
client: Original packet: [172] 16030100a7010000a3030373639315ac2ce319aaae55042de423b89201afe75a...
client: Filtered packet: [173] 16030100a8010000a4030373639315ac2ce319aaae55042de423b89201afe75a...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 141
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 (24 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [2] 0100
handshake old: [106] feffeddd0a36436c4adde69dedd5386b9af8f244cfadd1e9bc60ab87ae850cde...
handshake new: [107] feffeddd0a36436c4adde69dedd5386b9af8f244cfadd1e9bc60ab87ae850cde...
record old: [118] 0100006a000000000000006afeffeddd0a36436c4adde69dedd5386b9af8f244...
record new: [119] 0100006b000000000000006bfeffeddd0a36436c4adde69dedd5386b9af8f244...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afeffeddd0a3643...
client: Filtered packet: [132] 16feff000000000000000000770100006b000000000000006bfeffeddd0a3643...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 142
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 (25 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [2] 0100
handshake old: [160] fefddbb493f7d596f3ab7b82c0aaf479752ee3df48ed89beabdbe90f8063a565...
handshake new: [161] fefddbb493f7d596f3ab7b82c0aaf479752ee3df48ed89beabdbe90f8063a565...
record old: [172] 010000a000000000000000a0fefddbb493f7d596f3ab7b82c0aaf479752ee3df...
record new: [173] 010000a100000000000000a1fefddbb493f7d596f3ab7b82c0aaf479752ee3df...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefddbb493f7d5...
client: Filtered packet: [186] 16fefd000000000000000000ad010000a100000000000000a1fefddbb493f7d5...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 143
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/3 (30 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [0] 
handshake old: [109] 030243737db68039b392fb46eb3ef4e6bf05f972ebc4f9b85dc225893c1d3747...
handshake new: [108] 030243737db68039b392fb46eb3ef4e6bf05f972ebc4f9b85dc225893c1d3747...
record old: [113] 0100006d030243737db68039b392fb46eb3ef4e6bf05f972ebc4f9b85dc22589...
record new: [112] 0100006c030243737db68039b392fb46eb3ef4e6bf05f972ebc4f9b85dc22589...
client: Original packet: [118] 16030100710100006d030243737db68039b392fb46eb3ef4e6bf05f972ebc4f9...
client: Filtered packet: [117] 16030100700100006c030243737db68039b392fb46eb3ef4e6bf05f972ebc4f9...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 143
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 (28 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [0] 
handshake old: [163] 03039392e9e3b2cbfbcf4b21970776c6688e87eb8de5a44457608a93d94aef0d...
handshake new: [162] 03039392e9e3b2cbfbcf4b21970776c6688e87eb8de5a44457608a93d94aef0d...
record old: [167] 010000a303039392e9e3b2cbfbcf4b21970776c6688e87eb8de5a44457608a93...
record new: [166] 010000a203039392e9e3b2cbfbcf4b21970776c6688e87eb8de5a44457608a93...
client: Original packet: [172] 16030100a7010000a303039392e9e3b2cbfbcf4b21970776c6688e87eb8de5a4...
client: Filtered packet: [171] 16030100a6010000a203039392e9e3b2cbfbcf4b21970776c6688e87eb8de5a4...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 142
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 (24 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [0] 
handshake old: [106] fefff16bbd43a208b4fc4ae71541de7bef434a702fc7ad74dbf97f3fc5bb5ab1...
handshake new: [105] fefff16bbd43a208b4fc4ae71541de7bef434a702fc7ad74dbf97f3fc5bb5ab1...
record old: [118] 0100006a000000000000006afefff16bbd43a208b4fc4ae71541de7bef434a70...
record new: [117] 010000690000000000000069fefff16bbd43a208b4fc4ae71541de7bef434a70...
client: Original packet: [131] 16feff000000000000000000760100006a000000000000006afefff16bbd43a2...
client: Filtered packet: [130] 16feff00000000000000000075010000690000000000000069fefff16bbd43a2...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 142
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 (25 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [1] 00
extension new: [0] 
handshake old: [160] fefd04a6df3f0d50cefce861ff7b5715f3723794d5bc13c945c7b6c7cbf93f00...
handshake new: [159] fefd04a6df3f0d50cefce861ff7b5715f3723794d5bc13c945c7b6c7cbf93f00...
record old: [172] 010000a000000000000000a0fefd04a6df3f0d50cefce861ff7b5715f3723794...
record new: [171] 0100009f000000000000009ffefd04a6df3f0d50cefce861ff7b5715f3723794...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd04a6df3f0d...
client: Filtered packet: [184] 16fefd000000000000000000ab0100009f000000000000009ffefd04a6df3f0d...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 143
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/3 (28 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 143
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/0 (78 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 139
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 135
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/1 (106 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 138
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 137
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/2 (76 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 140
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 133
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsHandshake/3 (82 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 134
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 130
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/0 (84 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 128
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/1 (80 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 128
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/2 (80 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 130
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveClient/3 (79 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 122
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/0 (82 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 123
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 121
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/1 (77 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 123
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 122
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/2 (77 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 124
client: Readable
client: Handshake
client: Would have blocked
Poll() waiters = 2 timers = 121
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveServer/3 (73 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 120
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 116
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/0 (77 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 116
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 114
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/1 (77 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 117
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 114
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/2 (98 ms)
[ RUN      ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
server: Would have blocked
Poll() waiters = 2 timers = 117
client: Readable
client: Handshake
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 114
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SignedCertificateTimestampsInactiveBoth/3 (82 ms)
[----------] 64 tests from ExtensionPre13Datagram/TlsExtensionTestPre13 (2912 ms total)

[----------] 4 tests from ExtensionDatagramOnly/TlsExtensionTestDtls
[ RUN      ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [7] 00040001000200
extension new: [3] 000400
handshake old: [171] fefdb6858c740a38acda3ad8fd0dd2a46070fc7f41429614cae910752a25b7be...
handshake new: [167] fefdb6858c740a38acda3ad8fd0dd2a46070fc7f41429614cae910752a25b7be...
record old: [183] 010000ab00000000000000abfefdb6858c740a38acda3ad8fd0dd2a46070fc7f...
record new: [179] 010000a700000000000000a7fefdb6858c740a38acda3ad8fd0dd2a46070fc7f...
client: Original packet: [196] 16fefd000000000000000000b7010000ab00000000000000abfefdb6858c740a...
client: Filtered packet: [192] 16fefd000000000000000000b3010000a700000000000000a7fefdb6858c740a...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 115
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/0 (27 ms)
[ RUN      ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [7] 00040001000200
extension new: [3] 000400
handshake old: [117] feff21083d1bf5100c7a736aa9cfb4c9204b93afa924dc80d25402f4b7ac26a3...
handshake new: [113] feff21083d1bf5100c7a736aa9cfb4c9204b93afa924dc80d25402f4b7ac26a3...
record old: [129] 010000750000000000000075feff21083d1bf5100c7a736aa9cfb4c9204b93af...
record new: [125] 010000710000000000000071feff21083d1bf5100c7a736aa9cfb4c9204b93af...
client: Original packet: [142] 16feff00000000000000000081010000750000000000000075feff21083d1bf5...
client: Filtered packet: [138] 16feff0000000000000000007d010000710000000000000071feff21083d1bf5...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 115
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/1 (24 ms)
[ RUN      ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/0
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [7] 00040001000200
extension new: [4] 0001ff00
handshake old: [171] fefdceefb7dd137adad03dab4696247a0c731adce310414c059d187625188526...
handshake new: [168] fefdceefb7dd137adad03dab4696247a0c731adce310414c059d187625188526...
record old: [183] 010000ab00000000000000abfefdceefb7dd137adad03dab4696247a0c731adc...
record new: [180] 010000a800000000000000a8fefdceefb7dd137adad03dab4696247a0c731adc...
client: Original packet: [196] 16fefd000000000000000000b7010000ab00000000000000abfefdceefb7dd13...
client: Filtered packet: [193] 16fefd000000000000000000b4010000a800000000000000a8fefdceefb7dd13...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 115
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/0 (31 ms)
[ RUN      ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/1
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [7] 00040001000200
extension new: [4] 0001ff00
handshake old: [117] feffcb331274377c6f29fe029da30f7db50f2e81b36186803fcd98e177e4f01b...
handshake new: [114] feffcb331274377c6f29fe029da30f7db50f2e81b36186803fcd98e177e4f01b...
record old: [129] 010000750000000000000075feffcb331274377c6f29fe029da30f7db50f2e81...
record new: [126] 010000720000000000000072feffcb331274377c6f29fe029da30f7db50f2e81...
client: Original packet: [142] 16feff00000000000000000081010000750000000000000075feffcb33127437...
client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072feffcb33127437...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 116
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/1 (24 ms)
[----------] 4 tests from ExtensionDatagramOnly/TlsExtensionTestDtls (106 ms total)

[----------] 8 tests from ExtensionTls12Plus/TlsExtensionTest12Plus
[ RUN      ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [24] 001604010501060102010403050306030203050204020202
extension new: [1] 00
handshake old: [163] 0303cbde4ecf2844210fa75c0043ab0f678638b7c970d85dbe8f1ede020070ff...
handshake new: [140] 0303cbde4ecf2844210fa75c0043ab0f678638b7c970d85dbe8f1ede020070ff...
record old: [167] 010000a30303cbde4ecf2844210fa75c0043ab0f678638b7c970d85dbe8f1ede...
record new: [144] 0100008c0303cbde4ecf2844210fa75c0043ab0f678638b7c970d85dbe8f1ede...
client: Original packet: [172] 16030100a7010000a30303cbde4ecf2844210fa75c0043ab0f678638b7c970d8...
client: Filtered packet: [149] 16030100900100008c0303cbde4ecf2844210fa75c0043ab0f678638b7c970d8...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 115
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/0 (24 ms)
[ RUN      ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [24] 001604010501060102010403050306030203050204020202
extension new: [1] 00
handshake old: [160] fefd6325ce01ab8f357e9c84076d1266ad183ac7c9d869ae3ddba39b66ecffce...
handshake new: [137] fefd6325ce01ab8f357e9c84076d1266ad183ac7c9d869ae3ddba39b66ecffce...
record old: [172] 010000a000000000000000a0fefd6325ce01ab8f357e9c84076d1266ad183ac7...
record new: [149] 010000890000000000000089fefd6325ce01ab8f357e9c84076d1266ad183ac7...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd6325ce01ab...
client: Filtered packet: [162] 16fefd00000000000000000095010000890000000000000089fefd6325ce01ab...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 116
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/1 (41 ms)
[ RUN      ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [24] 001604010501060102010403050306030203050204020202
extension new: [5] 0002040100
handshake old: [163] 03031373e834d3a79631f130812fa846def916147e4765f2b246dbf9ea54d6ed...
handshake new: [144] 03031373e834d3a79631f130812fa846def916147e4765f2b246dbf9ea54d6ed...
record old: [167] 010000a303031373e834d3a79631f130812fa846def916147e4765f2b246dbf9...
record new: [148] 0100009003031373e834d3a79631f130812fa846def916147e4765f2b246dbf9...
client: Original packet: [172] 16030100a7010000a303031373e834d3a79631f130812fa846def916147e4765...
client: Filtered packet: [153] 16030100940100009003031373e834d3a79631f130812fa846def916147e4765...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 114
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/0 (24 ms)
[ RUN      ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [24] 001604010501060102010403050306030203050204020202
extension new: [5] 0002040100
handshake old: [160] fefd3cde02cdf8382d6c84b27d3e6cec66c54ad3c764e13ba805c3a47859d3ad...
handshake new: [141] fefd3cde02cdf8382d6c84b27d3e6cec66c54ad3c764e13ba805c3a47859d3ad...
record old: [172] 010000a000000000000000a0fefd3cde02cdf8382d6c84b27d3e6cec66c54ad3...
record new: [153] 0100008d000000000000008dfefd3cde02cdf8382d6c84b27d3e6cec66c54ad3...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd3cde02cdf8...
client: Filtered packet: [166] 16fefd000000000000000000990100008d000000000000008dfefd3cde02cdf8...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 116
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/1 (24 ms)
[ RUN      ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [24] 001604010501060102010403050306030203050204020202
extension new: [2] 0000
handshake old: [163] 030329c677c342abcccf7ce07d291f9c125de8baad15af6f89508c048afd6ca6...
handshake new: [141] 030329c677c342abcccf7ce07d291f9c125de8baad15af6f89508c048afd6ca6...
record old: [167] 010000a3030329c677c342abcccf7ce07d291f9c125de8baad15af6f89508c04...
record new: [145] 0100008d030329c677c342abcccf7ce07d291f9c125de8baad15af6f89508c04...
client: Original packet: [172] 16030100a7010000a3030329c677c342abcccf7ce07d291f9c125de8baad15af...
client: Filtered packet: [150] 16030100910100008d030329c677c342abcccf7ce07d291f9c125de8baad15af...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 116
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/0 (25 ms)
[ RUN      ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [24] 001604010501060102010403050306030203050204020202
extension new: [2] 0000
handshake old: [160] fefd836339be70eefb646a603c0d2c4b5cc820ae38fb7fa6ac63c859c8b0bbaa...
handshake new: [138] fefd836339be70eefb646a603c0d2c4b5cc820ae38fb7fa6ac63c859c8b0bbaa...
record old: [172] 010000a000000000000000a0fefd836339be70eefb646a603c0d2c4b5cc820ae...
record new: [150] 0100008a000000000000008afefd836339be70eefb646a603c0d2c4b5cc820ae...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefd836339be70...
client: Filtered packet: [163] 16fefd000000000000000000960100008a000000000000008afefd836339be70...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 116
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/1 (24 ms)
[ RUN      ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/0
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [24] 001604010501060102010403050306030203050204020202
extension new: [3] 000104
handshake old: [163] 0303c72cf44423c09b5ad7f4202b3686663646b73e9ad5da46d280e1f1623d0d...
handshake new: [142] 0303c72cf44423c09b5ad7f4202b3686663646b73e9ad5da46d280e1f1623d0d...
record old: [167] 010000a30303c72cf44423c09b5ad7f4202b3686663646b73e9ad5da46d280e1...
record new: [146] 0100008e0303c72cf44423c09b5ad7f4202b3686663646b73e9ad5da46d280e1...
client: Original packet: [172] 16030100a7010000a30303c72cf44423c09b5ad7f4202b3686663646b73e9ad5...
client: Filtered packet: [151] 16030100920100008e0303c72cf44423c09b5ad7f4202b3686663646b73e9ad5...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 117
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/0 (24 ms)
[ RUN      ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/1
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
extension old: [24] 001604010501060102010403050306030203050204020202
extension new: [3] 000104
handshake old: [160] fefdfde50cc4caccfa1ae24af6bbdb01a8021418df41d2d81f6df4b5e96a8873...
handshake new: [139] fefdfde50cc4caccfa1ae24af6bbdb01a8021418df41d2d81f6df4b5e96a8873...
record old: [172] 010000a000000000000000a0fefdfde50cc4caccfa1ae24af6bbdb01a8021418...
record new: [151] 0100008b000000000000008bfefdfde50cc4caccfa1ae24af6bbdb01a8021418...
client: Original packet: [185] 16fefd000000000000000000ac010000a000000000000000a0fefdfde50cc4ca...
client: Filtered packet: [164] 16fefd000000000000000000970100008b000000000000008bfefdfde50cc4ca...
client: Would have blocked
server: Handshake
Alert: [2] 0232
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 117
client: Readable
client: Handshake
client: Handshake failed with SSL error 95: Peer could not decode an SSL handshake message.
client: Changing state from CONNECTING to ERROR
[       OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/1 (24 ms)
[----------] 8 tests from ExtensionTls12Plus/TlsExtensionTest12Plus (212 ms total)

[----------] 21 tests from Pre13StreamOnly/TlsConnectStreamPre13
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndClientRenegotiate/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 117
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 114
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from CONNECTED to CONNECTING
client: Changing state from CONNECTED to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 115
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 114
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndClientRenegotiate/0 (113 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndClientRenegotiate/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 115
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 113
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
server: Changing state from CONNECTED to CONNECTING
client: Changing state from CONNECTED to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 114
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 113
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndClientRenegotiate/1 (112 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndClientRenegotiate/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 114
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
server: Changing state from CONNECTED to CONNECTING
client: Changing state from CONNECTED to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 112
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndClientRenegotiate/2 (111 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndServerRenegotiate/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 110
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Changing state from CONNECTED to CONNECTING
server: Changing state from CONNECTED to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 110
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndServerRenegotiate/0 (113 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndServerRenegotiate/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
client: Changing state from CONNECTED to CONNECTING
server: Changing state from CONNECTED to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndServerRenegotiate/1 (113 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndServerRenegotiate/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 107
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
client: Changing state from CONNECTED to CONNECTING
server: Changing state from CONNECTED to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 106
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectAndServerRenegotiate/2 (123 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
handshake old: [130] 008094b05335f4cd3db07d86a142e2835607b556ac881eb85ff6dfa61a6bc8f4...
handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [134] 10000082008094b05335f4cd3db07d86a142e2835607b556ac881eb85ff6dfa6...
record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [198] 160301008610000082008094b05335f4cd3db07d86a142e2835607b556ac881e...
client: Filtered packet: [198] 1603010086100000820100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 105
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/0 (41 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
handshake old: [130] 00807fc0dec24ea3d019b67e07fa5e8b5c41e226fa3f3df2b57d2029ffe5f9ae...
handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [134] 1000008200807fc0dec24ea3d019b67e07fa5e8b5c41e226fa3f3df2b57d2029...
record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [214] 16030200861000008200807fc0dec24ea3d019b67e07fa5e8b5c41e226fa3f3d...
client: Filtered packet: [214] 1603020086100000820100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/1 (41 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
handshake old: [130] 00800fd22a2ab57569692bfe65621ba3c850792287e918f12809d4e6e29ce3f8...
handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [134] 1000008200800fd22a2ab57569692bfe65621ba3c850792287e918f12809d4e6...
record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [190] 16030300861000008200800fd22a2ab57569692bfe65621ba3c850792287e918...
client: Filtered packet: [190] 1603030086100000820100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 105
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/2 (27 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/0 (54 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/1 (56 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/2 (59 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
handshake old: [130] 008050b91b2998a06431fbfec130e48c640c57e000705a416cf3a2ceb2bfa3fd...
handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [134] 10000082008050b91b2998a06431fbfec130e48c640c57e000705a416cf3a2ce...
record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [198] 160301008610000082008050b91b2998a06431fbfec130e48c640c57e000705a...
client: Filtered packet: [198] 1603010086100000820100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/0 (41 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
handshake old: [130] 00803f970b0df1d3b9445203f89176dbc58b5bf562a8c86532d419987a62356a...
handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [134] 1000008200803f970b0df1d3b9445203f89176dbc58b5bf562a8c86532d41998...
record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [214] 16030200861000008200803f970b0df1d3b9445203f89176dbc58b5bf562a8c8...
client: Filtered packet: [214] 1603020086100000820100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/1 (46 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
handshake old: [130] 00805421fbb117609c9a4c61b7c304e51fb437815f4e82d262b951137befb625...
handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
record old: [134] 1000008200805421fbb117609c9a4c61b7c304e51fb437815f4e82d262b95113...
record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff...
client: Original packet: [190] 16030300861000008200805421fbb117609c9a4c61b7c304e51fb437815f4e82...
client: Filtered packet: [190] 1603030086100000820100ffffffffffffffffffffffffffffffffffffffffff...
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/2 (44 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 106
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/0 (36 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/1 (43 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
Alert: [2] 0214
server: Handshake failed with SSL error 15: SSL received a record with an incorrect Message Authentication Code.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Handshake failed with SSL error 16: SSL peer reports incorrect Message Authentication Code.
client: Changing state from CONNECTING to ERROR
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/2 (37 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/0 (38 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/1
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/1 (47 ms)
[ RUN      ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/2
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256
[       OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/2 (38 ms)
[----------] 21 tests from Pre13StreamOnly/TlsConnectStreamPre13 (1341 ms total)

[----------] 8 tests from SkipTls10/TlsSkipTest
[ RUN      ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [531] 020000510301bb63b3a4eae861be580d3ec1a760d5c3196623231b3793db921e...
record new: [89] 020000510301bb63b3a4eae861be580d3ec1a760d5c3196623231b3793db921e...
server: Original packet: [536] 1603010213020000510301bb63b3a4eae861be580d3ec1a760d5c3196623231b...
server: Filtered packet: [94] 1603010059020000510301bb63b3a4eae861be580d3ec1a760d5c3196623231b...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0 (27 ms)
[ RUN      ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [740] 020000570301bf2f4536b010820bfe25495776fcb0771ba1c5720e080d038695...
record new: [298] 020000570301bf2f4536b010820bfe25495776fcb0771ba1c5720e080d038695...
server: Original packet: [745] 16030102e4020000570301bf2f4536b010820bfe25495776fcb0771ba1c5720e...
server: Filtered packet: [303] 160301012a020000570301bf2f4536b010820bfe25495776fcb0771ba1c5720e...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 110
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0 (44 ms)
[ RUN      ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [740] 020000570301a33b0bccac48d7baa6b342de3a8e3e35078514350aeb6d50a893...
record new: [298] 020000570301a33b0bccac48d7baa6b342de3a8e3e35078514350aeb6d50a893...
server: Original packet: [745] 16030102e4020000570301a33b0bccac48d7baa6b342de3a8e3e35078514350a...
server: Filtered packet: [303] 160301012a020000570301a33b0bccac48d7baa6b342de3a8e3e35078514350a...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0 (35 ms)
[ RUN      ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [551] 02000057030101f9179b541c1c3a259a2463e63a14e532671d54fbe4d5ffcb05...
record new: [241] 02000057030101f9179b541c1c3a259a2463e63a14e532671d54fbe4d5ffcb05...
server: Original packet: [556] 160301022702000057030101f9179b541c1c3a259a2463e63a14e532671d54fb...
server: Filtered packet: [246] 16030100f102000057030101f9179b541c1c3a259a2463e63a14e532671d54fb...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0 (17 ms)
[ RUN      ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [740] 02000057030197b6767f5ae028f5b2eb7a08ea567006c6730609458a1e1a4e79...
record new: [537] 02000057030197b6767f5ae028f5b2eb7a08ea567006c6730609458a1e1a4e79...
server: Original packet: [745] 16030102e402000057030197b6767f5ae028f5b2eb7a08ea567006c673060945...
server: Filtered packet: [542] 160301021902000057030197b6767f5ae028f5b2eb7a08ea567006c673060945...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 112
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0 (43 ms)
[ RUN      ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [550] 0200005703018b3c00c9ca92c42ec3f70ee4064aab03ea6f117b47ac92009ca6...
record new: [405] 0200005703018b3c00c9ca92c42ec3f70ee4064aab03ea6f117b47ac92009ca6...
server: Original packet: [555] 16030102260200005703018b3c00c9ca92c42ec3f70ee4064aab03ea6f117b47...
server: Filtered packet: [410] 16030101950200005703018b3c00c9ca92c42ec3f70ee4064aab03ea6f117b47...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 112
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 112
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (19 ms)
[ RUN      ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [740] 02000057030142ddee698b401f4f593a981ebda37ce6fe0cc72f5721d9880d49...
record new: [298] 02000057030142ddee698b401f4f593a981ebda37ce6fe0cc72f5721d9880d49...
Dropping handshake: 12
record old: [298] 02000057030142ddee698b401f4f593a981ebda37ce6fe0cc72f5721d9880d49...
record new: [95] 02000057030142ddee698b401f4f593a981ebda37ce6fe0cc72f5721d9880d49...
server: Original packet: [745] 16030102e402000057030142ddee698b401f4f593a981ebda37ce6fe0cc72f57...
server: Filtered packet: [100] 160301005f02000057030142ddee698b401f4f593a981ebda37ce6fe0cc72f57...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 113
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 113
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0 (37 ms)
[ RUN      ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [552] 0200005703013c718b2db56203fbe3eb13da285158e044fcbdc2b7decd3aec93...
record new: [242] 0200005703013c718b2db56203fbe3eb13da285158e044fcbdc2b7decd3aec93...
Dropping handshake: 12
record old: [242] 0200005703013c718b2db56203fbe3eb13da285158e044fcbdc2b7decd3aec93...
record new: [95] 0200005703013c718b2db56203fbe3eb13da285158e044fcbdc2b7decd3aec93...
server: Original packet: [557] 16030102280200005703013c718b2db56203fbe3eb13da285158e044fcbdc2b7...
server: Filtered packet: [100] 160301005f0200005703013c718b2db56203fbe3eb13da285158e044fcbdc2b7...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 114
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (19 ms)
[----------] 8 tests from SkipTls10/TlsSkipTest (242 ms total)

[----------] 32 tests from SkipVariants/TlsSkipTest
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [531] 0200005103026cd1d8ae3c550d3040ba0b455de7824639eaf7da1007350007c1...
record new: [89] 0200005103026cd1d8ae3c550d3040ba0b455de7824639eaf7da1007350007c1...
server: Original packet: [536] 16030202130200005103026cd1d8ae3c550d3040ba0b455de7824639eaf7da10...
server: Filtered packet: [94] 16030200590200005103026cd1d8ae3c550d3040ba0b455de7824639eaf7da10...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 114
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0 (26 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [531] 02000051030337aae17d239b18b2632e06dd849d0f85b61fd9192ca0ae194f7d...
record new: [89] 02000051030337aae17d239b18b2632e06dd849d0f85b61fd9192ca0ae194f7d...
server: Original packet: [536] 160303021302000051030337aae17d239b18b2632e06dd849d0f85b61fd9192c...
server: Filtered packet: [94] 160303005902000051030337aae17d239b18b2632e06dd849d0f85b61fd9192c...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 115
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1 (26 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202...
record new: [0] 
record old: [12] 0e0000000002000000000000
record new: [12] 0e0000000001000000000000
server: Original packet: [594] 16feff0000000000000000005d020000510000000000000051feffc58efc038b...
server: Filtered packet: [144] 16feff0000000000000000005d020000510000000000000051feffc58efc038b...
server: Would have blocked
Poll() waiters = 2 timers = 118
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2 (50 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202...
record new: [0] 
record old: [12] 0e0000000002000000000000
record new: [12] 0e0000000001000000000000
server: Original packet: [594] 16fefd0000000000000000005d020000510000000000000051fefd5341460908...
server: Filtered packet: [144] 16fefd0000000000000000005d020000510000000000000051fefd5341460908...
server: Would have blocked
Poll() waiters = 2 timers = 120
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3 (27 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [740] 02000057030263c5e6c1628c4c52f92e9edad36090f4ffa6e72c18bc1112543a...
record new: [298] 02000057030263c5e6c1628c4c52f92e9edad36090f4ffa6e72c18bc1112543a...
server: Original packet: [745] 16030202e402000057030263c5e6c1628c4c52f92e9edad36090f4ffa6e72c18...
server: Filtered packet: [303] 160302012a02000057030263c5e6c1628c4c52f92e9edad36090f4ffa6e72c18...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 121
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0 (37 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [742] 020000570303c5cee5f3089a69a06b6dd3bdd8a95b8955014693f481b8bd0f39...
record new: [300] 020000570303c5cee5f3089a69a06b6dd3bdd8a95b8955014693f481b8bd0f39...
server: Original packet: [747] 16030302e6020000570303c5cee5f3089a69a06b6dd3bdd8a95b8955014693f4...
server: Filtered packet: [305] 160303012c020000570303c5cee5f3089a69a06b6dd3bdd8a95b8955014693f4...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 119
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1 (40 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202...
record new: [0] 
record old: [211] 0c0000c700020000000000c70300174104b7efabf882c54bfe29e1901ec4d092...
record new: [211] 0c0000c700010000000000c70300174104b7efabf882c54bfe29e1901ec4d092...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feffe9961b0223...
server: Filtered packet: [374] 16feff00000000000000000063020000570000000000000057feffe9961b0223...
server: Would have blocked
Poll() waiters = 2 timers = 120
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2 (37 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202...
record new: [0] 
record old: [213] 0c0000c900020000000000c90300174104b7efabf882c54bfe29e1901ec4d092...
record new: [213] 0c0000c900010000000000c90300174104b7efabf882c54bfe29e1901ec4d092...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd9c4169fe33...
server: Filtered packet: [376] 16fefd00000000000000000063020000570000000000000057fefd9c4169fe33...
server: Would have blocked
Poll() waiters = 2 timers = 122
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3 (36 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [740] 0200005703025b6a66f296638b44e1f4aac75bf0e6c989c60a2be90c39d962a4...
record new: [298] 0200005703025b6a66f296638b44e1f4aac75bf0e6c989c60a2be90c39d962a4...
server: Original packet: [745] 16030202e40200005703025b6a66f296638b44e1f4aac75bf0e6c989c60a2be9...
server: Filtered packet: [303] 160302012a0200005703025b6a66f296638b44e1f4aac75bf0e6c989c60a2be9...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 123
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0 (39 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [742] 020000570303c41197f5751a4742ba628588914c62cc1c09c7248f0ac2eab279...
record new: [300] 020000570303c41197f5751a4742ba628588914c62cc1c09c7248f0ac2eab279...
server: Original packet: [747] 16030302e6020000570303c41197f5751a4742ba628588914c62cc1c09c7248f...
server: Filtered packet: [305] 160303012c020000570303c41197f5751a4742ba628588914c62cc1c09c7248f...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 120
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1 (39 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202...
record new: [0] 
record old: [211] 0c0000c700020000000000c70300174104b7efabf882c54bfe29e1901ec4d092...
record new: [211] 0c0000c700010000000000c70300174104b7efabf882c54bfe29e1901ec4d092...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feffd55f1059cc...
server: Filtered packet: [374] 16feff00000000000000000063020000570000000000000057feffd55f1059cc...
server: Would have blocked
Poll() waiters = 2 timers = 121
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2 (38 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202...
record new: [0] 
record old: [213] 0c0000c900020000000000c90300174104b7efabf882c54bfe29e1901ec4d092...
record new: [213] 0c0000c900010000000000c90300174104b7efabf882c54bfe29e1901ec4d092...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd8bc60a0ceb...
server: Filtered packet: [376] 16fefd00000000000000000063020000570000000000000057fefd8bc60a0ceb...
server: Would have blocked
Poll() waiters = 2 timers = 123
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3 (37 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [550] 02000057030268caa6dd51f8197218c22a228c088f0187bdbb4958d4516cfb53...
record new: [240] 02000057030268caa6dd51f8197218c22a228c088f0187bdbb4958d4516cfb53...
server: Original packet: [555] 160302022602000057030268caa6dd51f8197218c22a228c088f0187bdbb4958...
server: Filtered packet: [245] 16030200f002000057030268caa6dd51f8197218c22a228c088f0187bdbb4958...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 122
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0 (18 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [553] 0200005703038faeb12e23b7d0ce585320a8ed85e01bb33d2cf3db9f4f879635...
record new: [243] 0200005703038faeb12e23b7d0ce585320a8ed85e01bb33d2cf3db9f4f879635...
server: Original packet: [558] 16030302290200005703038faeb12e23b7d0ce585320a8ed85e01bb33d2cf3db...
server: Filtered packet: [248] 16030300f30200005703038faeb12e23b7d0ce585320a8ed85e01bb33d2cf3db...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 122
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1 (19 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [318] 0b000132000100000000013200012f00012c308201283081cfa0030201020201...
record new: [0] 
record old: [154] 0c00008e000200000000008e0300174104b7efabf882c54bfe29e1901ec4d092...
record new: [154] 0c00008e000100000000008e0300174104b7efabf882c54bfe29e1901ec4d092...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [635] 16feff00000000000000000063020000570000000000000057feff36c9a8af94...
server: Filtered packet: [317] 16feff00000000000000000063020000570000000000000057feff36c9a8af94...
server: Would have blocked
Poll() waiters = 2 timers = 124
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 122
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2 (19 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [318] 0b000132000100000000013200012f00012c308201283081cfa0030201020201...
record new: [0] 
record old: [156] 0c00009000020000000000900300174104b7efabf882c54bfe29e1901ec4d092...
record new: [156] 0c00009000010000000000900300174104b7efabf882c54bfe29e1901ec4d092...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [637] 16fefd00000000000000000063020000570000000000000057fefddbca2c2518...
server: Filtered packet: [319] 16fefd00000000000000000063020000570000000000000057fefddbca2c2518...
server: Would have blocked
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 45: SSL received an unexpected Server Key Exchange handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3 (19 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [740] 02000057030240697e07ae486bae9d5009f9a127725f6002f3bc40150e40513d...
record new: [537] 02000057030240697e07ae486bae9d5009f9a127725f6002f3bc40150e40513d...
server: Original packet: [745] 16030202e402000057030240697e07ae486bae9d5009f9a127725f6002f3bc40...
server: Filtered packet: [542] 160302021902000057030240697e07ae486bae9d5009f9a127725f6002f3bc40...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 122
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0 (37 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [742] 0200005703037fb78300b4456f0afbf45af0002ac2dd6b023b46422f630b6d6a...
record new: [537] 0200005703037fb78300b4456f0afbf45af0002ac2dd6b023b46422f630b6d6a...
server: Original packet: [747] 16030302e60200005703037fb78300b4456f0afbf45af0002ac2dd6b023b4642...
server: Filtered packet: [542] 16030302190200005703037fb78300b4456f0afbf45af0002ac2dd6b023b4642...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 123
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1 (36 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [211] 0c0000c700020000000000c70300174104b7efabf882c54bfe29e1901ec4d092...
record new: [0] 
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feff48612cf30b...
server: Filtered packet: [613] 16feff00000000000000000063020000570000000000000057feff48612cf30b...
server: Would have blocked
Poll() waiters = 2 timers = 123
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 123
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2 (39 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [213] 0c0000c900020000000000c90300174104b7efabf882c54bfe29e1901ec4d092...
record new: [0] 
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd9875f58835...
server: Filtered packet: [613] 16fefd00000000000000000063020000570000000000000057fefd9875f58835...
server: Would have blocked
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 123
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3 (39 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [552] 020000570302605c03f231871be8cde5eccd94465ef71a084624f5dad3107841...
record new: [405] 020000570302605c03f231871be8cde5eccd94465ef71a084624f5dad3107841...
server: Original packet: [557] 1603020228020000570302605c03f231871be8cde5eccd94465ef71a084624f5...
server: Filtered packet: [410] 1603020195020000570302605c03f231871be8cde5eccd94465ef71a084624f5...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 124
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (17 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [552] 0200005703037aeae9fbbd25885bd6b639fa21d03603da0744fcdc5a97576663...
record new: [405] 0200005703037aeae9fbbd25885bd6b639fa21d03603da0744fcdc5a97576663...
server: Original packet: [557] 16030302280200005703037aeae9fbbd25885bd6b639fa21d03603da0744fcdc...
server: Filtered packet: [410] 16030301950200005703037aeae9fbbd25885bd6b639fa21d03603da0744fcdc...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 124
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1 (17 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [154] 0c00008e000200000000008e0300174104b7efabf882c54bfe29e1901ec4d092...
record new: [0] 
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [635] 16feff00000000000000000063020000570000000000000057fefff0f4a48210...
server: Filtered packet: [481] 16feff00000000000000000063020000570000000000000057fefff0f4a48210...
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2 (17 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 12
record old: [157] 0c00009100020000000000910300174104b7efabf882c54bfe29e1901ec4d092...
record new: [0] 
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
server: Original packet: [638] 16fefd00000000000000000063020000570000000000000057fefd000e495243...
server: Filtered packet: [481] 16fefd00000000000000000063020000570000000000000057fefd000e495243...
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 126
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3 (21 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [740] 020000570302568480a1d7e704f1445b6d910b998195da62ddd6314748812ef5...
record new: [298] 020000570302568480a1d7e704f1445b6d910b998195da62ddd6314748812ef5...
Dropping handshake: 12
record old: [298] 020000570302568480a1d7e704f1445b6d910b998195da62ddd6314748812ef5...
record new: [95] 020000570302568480a1d7e704f1445b6d910b998195da62ddd6314748812ef5...
server: Original packet: [745] 16030202e4020000570302568480a1d7e704f1445b6d910b998195da62ddd631...
server: Filtered packet: [100] 160302005f020000570302568480a1d7e704f1445b6d910b998195da62ddd631...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0 (44 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [742] 020000570303631b092b33c0fb44b373ef2b3b93be6ff7eb82d6047c0a3ef2a1...
record new: [300] 020000570303631b092b33c0fb44b373ef2b3b93be6ff7eb82d6047c0a3ef2a1...
Dropping handshake: 12
record old: [300] 020000570303631b092b33c0fb44b373ef2b3b93be6ff7eb82d6047c0a3ef2a1...
record new: [95] 020000570303631b092b33c0fb44b373ef2b3b93be6ff7eb82d6047c0a3ef2a1...
server: Original packet: [747] 16030302e6020000570303631b092b33c0fb44b373ef2b3b93be6ff7eb82d604...
server: Filtered packet: [100] 160303005f020000570303631b092b33c0fb44b373ef2b3b93be6ff7eb82d604...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 122
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1 (36 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202...
record new: [0] 
record old: [211] 0c0000c700020000000000c70300174104b7efabf882c54bfe29e1901ec4d092...
record new: [211] 0c0000c700010000000000c70300174104b7efabf882c54bfe29e1901ec4d092...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
Dropping handshake: 12
record old: [211] 0c0000c700010000000000c70300174104b7efabf882c54bfe29e1901ec4d092...
record new: [0] 
record old: [12] 0e0000000002000000000000
record new: [12] 0e0000000001000000000000
server: Original packet: [824] 16feff00000000000000000063020000570000000000000057fefff3780594d7...
server: Filtered packet: [163] 16feff00000000000000000063020000570000000000000057fefff3780594d7...
server: Would have blocked
Poll() waiters = 2 timers = 125
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2 (40 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202...
record new: [0] 
record old: [213] 0c0000c900020000000000c90300174104b7efabf882c54bfe29e1901ec4d092...
record new: [213] 0c0000c900010000000000c90300174104b7efabf882c54bfe29e1901ec4d092...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
Dropping handshake: 12
record old: [213] 0c0000c900010000000000c90300174104b7efabf882c54bfe29e1901ec4d092...
record new: [0] 
record old: [12] 0e0000000002000000000000
record new: [12] 0e0000000001000000000000
server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd35221b67f9...
server: Filtered packet: [163] 16fefd00000000000000000063020000570000000000000057fefd35221b67f9...
server: Would have blocked
Poll() waiters = 2 timers = 127
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3 (40 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [551] 020000570302f6082bb281c9658a7e1d40431dc53749ba0f1a7591e02d98042a...
record new: [241] 020000570302f6082bb281c9658a7e1d40431dc53749ba0f1a7591e02d98042a...
Dropping handshake: 12
record old: [241] 020000570302f6082bb281c9658a7e1d40431dc53749ba0f1a7591e02d98042a...
record new: [95] 020000570302f6082bb281c9658a7e1d40431dc53749ba0f1a7591e02d98042a...
server: Original packet: [556] 1603020227020000570302f6082bb281c9658a7e1d40431dc53749ba0f1a7591...
server: Filtered packet: [100] 160302005f020000570302f6082bb281c9658a7e1d40431dc53749ba0f1a7591...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 125
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (18 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [552] 02000057030399b6d4e882f01a93cbf9dcdb269b67697eba17842e7d061e7120...
record new: [242] 02000057030399b6d4e882f01a93cbf9dcdb269b67697eba17842e7d061e7120...
Dropping handshake: 12
record old: [242] 02000057030399b6d4e882f01a93cbf9dcdb269b67697eba17842e7d061e7120...
record new: [95] 02000057030399b6d4e882f01a93cbf9dcdb269b67697eba17842e7d061e7120...
server: Original packet: [557] 160303022802000057030399b6d4e882f01a93cbf9dcdb269b67697eba17842e...
server: Filtered packet: [100] 160303005f02000057030399b6d4e882f01a93cbf9dcdb269b67697eba17842e...
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 126
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 125
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1 (17 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2
Version: DTLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [318] 0b000132000100000000013200012f00012c308201283081cfa0030201020201...
record new: [0] 
record old: [155] 0c00008f000200000000008f0300174104b7efabf882c54bfe29e1901ec4d092...
record new: [155] 0c00008f000100000000008f0300174104b7efabf882c54bfe29e1901ec4d092...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
Dropping handshake: 12
record old: [155] 0c00008f000100000000008f0300174104b7efabf882c54bfe29e1901ec4d092...
record new: [0] 
record old: [12] 0e0000000002000000000000
record new: [12] 0e0000000001000000000000
server: Original packet: [636] 16feff00000000000000000063020000570000000000000057feff605f8f20ff...
server: Filtered packet: [163] 16feff00000000000000000063020000570000000000000057feff605f8f20ff...
server: Would have blocked
Poll() waiters = 2 timers = 128
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
Poll() waiters = 2 timers = 126
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2 (18 ms)
[ RUN      ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3
Version: DTLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Would have blocked
server: Handshake
Dropping handshake: 11
record old: [318] 0b000132000100000000013200012f00012c308201283081cfa0030201020201...
record new: [0] 
record old: [155] 0c00008f000200000000008f0300174104b7efabf882c54bfe29e1901ec4d092...
record new: [155] 0c00008f000100000000008f0300174104b7efabf882c54bfe29e1901ec4d092...
record old: [12] 0e0000000003000000000000
record new: [12] 0e0000000002000000000000
Dropping handshake: 12
record old: [155] 0c00008f000100000000008f0300174104b7efabf882c54bfe29e1901ec4d092...
record new: [0] 
record old: [12] 0e0000000002000000000000
record new: [12] 0e0000000001000000000000
server: Original packet: [636] 16fefd00000000000000000063020000570000000000000057fefda14c906aff...
server: Filtered packet: [163] 16fefd00000000000000000063020000570000000000000057fefda14c906aff...
server: Would have blocked
Poll() waiters = 2 timers = 129
client: Readable
client: Handshake
Alert: [2] 020a
client: Handshake failed with SSL error 47: SSL received an unexpected Server Hello Done handshake message.
client: Changing state from CONNECTING to ERROR
server: Readable
server: Handshake
server: Handshake failed with SSL error 59: SSL peer was not expecting a handshake message it received.
server: Changing state from CONNECTING to ERROR
[       OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3 (27 ms)
[----------] 32 tests from SkipVariants/TlsSkipTest (978 ms total)

[----------] 11 tests from VersionsStream10Pre13/SSLv2ClientHelloTest
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.Connect/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d03012e3a882903727fd0a97e718598b584d71bc09d427d...
client: Filtered packet: [30] 801c0103010003000000100000334ae1b2c3dd562016c93d6b3c87a23d44
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 129
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 122
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.Connect/0 (142 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.NegotiateECSuite/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d03011f80a8c2c226ac86cd76969e5aa3726f1952d89d7c...
client: Filtered packet: [30] 801c01030100030000001000c013450a082a4777697900e700f3efa27964
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 122
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 120
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.NegotiateECSuite/0 (73 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddPadding/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d030107bbdf1db8291aa96ebc2d48c8125ccb6d6b9b0eee...
client: Filtered packet: [286] 011bff010301000300000010000033642244464febdb76291b15c2342e0aa300...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 121
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 116
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddPadding/0 (142 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.SendSecurityEscape/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d03017bf4bc96dd4818a286846bc675972b192a30304b34...
client: Filtered packet: [286] 411bff0103010003000000100000334c1dd7f458b7a28e5186ed98586b93d600...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 6: The server has encountered bad data from the client.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 117
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.SendSecurityEscape/0 (23 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d03010a877fc23ef445fc694d5d7bb20c433dc846b72cad...
client: Filtered packet: [36] 002104010301000300000010000033e0b6351838a592c9a66aa8a632e5632500...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 117
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding/0 (28 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding2/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d03016d11b26e9da05880b388a8a81227fceea19ee76e8d...
client: Filtered packet: [36] 0021060103010003000000100000333ff63101fb1b84a9412fd3964475f58300...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 117
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 (30 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.SmallClientRandom/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d03016c7fbd4a7da66f8c50d1b615e6c2265504ab2a9b1a...
client: Filtered packet: [29] 801b01030100030000000f000033a56d919c855df35823234ddf2ab9b9
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 116
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.SmallClientRandom/0 (32 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.MaxClientRandom/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d030193edaa7e57f0a92f514ade6437d140f5cce819d3b9...
client: Filtered packet: [46] 802c010301000300000020000033df7ce539fd0952318577bef29bead544ccd4...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 116
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 111
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.MaxClientRandom/0 (161 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.BigClientRandom/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d030100b468b3378ef840fb5a257f7fbf79365204690342...
client: Filtered packet: [47] 802d010301000300000021000033441fd20fea9b10d3e83a01c914c75c902023...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 111
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.BigClientRandom/0 (27 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0301c74907afd017f868fee2cc125eb5371f3f6663e62d...
client: Filtered packet: [30] 801c01030100030000001000003327481f7af5f459b675b701d0f54db773
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 113: Peer attempted old style (potentially vulnerable) handshake.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 111
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 (24 ms)
[ RUN      ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0
Version: TLS 1.0
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0301f6f27540f09f249017a87ce9c480a0ace81ab52c95...
client: Filtered packet: [33] 801f0103010006000000100000330000ff18a6f62e4856ae83bd1e18abbfbe1f...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 111
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 (144 ms)
[----------] 11 tests from VersionsStream10Pre13/SSLv2ClientHelloTest (827 ms total)

[----------] 22 tests from VersionsStreamPre13/SSLv2ClientHelloTest
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0302130007cdaa1004e288323a9a49f5298e3adfb71b98...
client: Filtered packet: [30] 801c01030200030000001000003358c949dba5ced687f343d0cb0b4e6988
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 105
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/0 (149 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a303037a22c10c860007506d42b9927854b3eaf632639985...
client: Filtered packet: [30] 801c01030300030000001000003378577c7a44c8ae1ace8925a1a42dfb61
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 105
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/1 (145 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d030266be5d746236e76d94989e5903cde9cfa092a853c5...
client: Filtered packet: [30] 801c01030200030000001000c0138bc50eb896f5c545c4e69592aeb41e14
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/0 (68 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a30303edd9f96642a0c44059bcdf5088d0816801ca5b2b92...
client: Filtered packet: [30] 801c01030300030000001000c0131289440568db7ac0587cc620564fd03b
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/1 (78 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0302bd9b8b5ad03706b19e3ea3dc6f31c5fde078732c18...
client: Filtered packet: [286] 011bff010302000300000010000033e8f4096497d40721c5ba1024d20ee70800...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 106
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/0 (143 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a303039d2a0c46967595b8d4fa6e92e669f3c633f56e8a77...
client: Filtered packet: [286] 011bff010303000300000010000033bb0171c4d6c1015bab23775d15e8294400...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 105
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/1 (159 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0302c0dff94cab1dbe494f8dbf5bb5c8c663c1a74eadf3...
client: Filtered packet: [286] 411bff010302000300000010000033d1075a5e897d30f900e5c130ac9ef1a200...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 6: The server has encountered bad data from the client.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 104
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/0 (23 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a303033a89f4a3c8ba471861bbc1203e334604ce3a7cfee0...
client: Filtered packet: [286] 411bff01030300030000001000003315faa9ea3d49e34fc1b32fb7a0efad7200...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 6: The server has encountered bad data from the client.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 105
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/1 (29 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0302ffb03c18226b6036607651f13f01ab7477228b4e92...
client: Filtered packet: [36] 00210401030200030000001000003346a0627a927450a572184376fecb097200...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 105
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/0 (27 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a303034d133d1bffa0c6e6a2d69fdd100d061dd0f55f765d...
client: Filtered packet: [36] 0021040103030003000000100000332abd63c628fdb1ba34d61f951a1d693000...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 106
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/1 (28 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0302c1ed47ce5dc694febee5ede9e262dd3020ea42a1cf...
client: Filtered packet: [36] 00210601030200030000001000003342ae58ebc0e2cf9b522e62754da21a3f00...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 106
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 (23 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a30303a0f1a68e120c1cb4e7af1fe1ff8867c310bada8353...
client: Filtered packet: [36] 00210601030300030000001000003369c5bb4f830eccdd5ec9b1338e502be600...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 107
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/1 (24 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0302476825be54f93b698022590e991dd09b2da54ae993...
client: Filtered packet: [29] 801b01030200030000000f0000331a4c10cd8520e9ce48d116befce961
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 108
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/0 (29 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a3030344a3ca89231113910d65618d33ea1658f9840a4e63...
client: Filtered packet: [29] 801b01030300030000000f0000335473584efef6d1bc6c017659551df4
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 108
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/1 (28 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d03022c8fedd243a48fb5b40980fc80cd32d39a24386ea0...
client: Filtered packet: [46] 802c0103020003000000200000335e953bc79a4fa5e38f6c78c8cda40dea8bad...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 107
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/0 (142 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a30303fd9d281a76edfa126bb01eec27abc5b4bf3579f542...
client: Filtered packet: [46] 802c010303000300000020000033416deca68b2e4516fc594bc88faad1d05978...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 108
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
Poll() waiters = 2 timers = 107
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/1 (147 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d03029d27f0c61a99b1557078fc4eb1d0864d64084dccfa...
client: Filtered packet: [47] 802d0103020003000000210000331d0939ff237a20291dd9e513a5bd4160e01e...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 108
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/0 (32 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a30303be3c5a6383e216fdc9c0760ef60ff1ff43ef5e1447...
client: Filtered packet: [47] 802d0103030003000000210000331de0bcb874d3105c243196d31c80dfb4a6c3...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 28: SSL received a malformed Client Hello handshake message.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 108
client: Readable
client: Handshake
client: Handshake failed with SSL error 62: SSL peer rejected a handshake message for unacceptable content.
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/1 (29 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d030281a9b335e5edb7a2327b5e8ccef776ba2f36101cfe...
client: Filtered packet: [30] 801c010302000300000010000033b2acda605b67d612d87e9e9d4b821c38
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 113: Peer attempted old style (potentially vulnerable) handshake.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 109
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 (29 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a303030dbac0b5a50d145f090a96e234c690c6dd1dcbbca1...
client: Filtered packet: [30] 801c01030300030000001000003359a9483dce22f879dcb5b9c9ca1dd322
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Handshake failed with SSL error 113: Peer attempted old style (potentially vulnerable) handshake.
server: Changing state from CONNECTING to ERROR
Poll() waiters = 1 timers = 109
client: Readable
client: Handshake
client: Handshake failed with SSL error 2: Cannot communicate securely with peer: no common encryption algorithm(s).
client: Changing state from CONNECTING to ERROR
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/1 (34 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0
Version: TLS 1.1
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [118] 16030100710100006d0302522d1346564f7971c574e89fa0a6434a493f32dd00...
client: Filtered packet: [33] 801f0103020006000000100000330000ffaa62dcbfb17efe9c2e31b30d64b3e3...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 109
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 103
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 (149 ms)
[ RUN      ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/1
Version: TLS 1.2
server: Changing state from INIT to CONNECTING
client: Changing state from INIT to CONNECTING
client: Handshake
client: Original packet: [172] 16030100a7010000a30303ce658caac6e16e0d648a43325e68ebaa051826ce5a...
client: Filtered packet: [33] 801f0103030006000000100000330000ff4117eda3a395675bd5454bbe469673...
client: Read --> wouldblock 5
client: Would have blocked
server: Handshake
server: Read --> wouldblock 5
server: Would have blocked
Poll() waiters = 2 timers = 104
client: Readable
client: Handshake
client: Read --> wouldblock 5
client: Would have blocked
server: Readable
server: Handshake
server: Handshake success
server: Changing state from CONNECTING to CONNECTED
server: Handshake success
Poll() waiters = 2 timers = 99
client: Readable
client: Handshake
client: Handshake success
client: Changing state from CONNECTING to CONNECTED
client: Handshake success
Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
[       OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/1 (157 ms)
[----------] 22 tests from VersionsStreamPre13/SSLv2ClientHelloTest (1676 ms total)

[----------] 10 tests from AllHashFuncs/TlsHkdfTest
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0
Hash = SHA-256
Output: [32] 33ad0a1c607ec03b09e6cd9893680ce210adf300aa1f2660e1b22e10f170f92a
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0 (4 ms)
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1
Hash = SHA-384
Output: [48] 7ee8206f5570023e6dc7519eb1073bc4e791ad37b5c382aa10ba18e2357e7169...
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1 (4 ms)
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0
Hash = SHA-256
Output: [32] 11873828a9197811339124b58a1bb09f7f0d8dbb10f49c54bd1fd885cd153033
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0 (3 ms)
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1
Hash = SHA-384
Output: [48] 51b1d5b4597979084a15b2db84d3d6bcfc9345d9dc74da1a57c2769f3f83452f...
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1 (0 ms)
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0
Hash = SHA-256
Output: [32] 2f5f78d0a4c436ee6c8a4ef9d043810213fd4783633ad2e1406d2d9800fdc187
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0 (1 ms)
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1
Hash = SHA-384
Output: [48] 7b40f9ef91ffc9d129245cbff8827668ae4b63e803dd39a8d46af6e5eceaf87d...
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1 (0 ms)
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0
Hash = SHA-256
Output: [32] 7953b8dd6b98ce00b7dce803708ce3ac068b22fd0e3448e6e5e08ad61618e548
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0 (1 ms)
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1
Hash = SHA-384
Output: [48] 0193c0073f6a830e2e4fb258e400085c689c37320037ffc31c5b980b02923ffd...
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1 (0 ms)
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0
Hash = SHA-256
Output: [32] 668a551aef337b4526a636b1e02348246f34a557114ab564c45c69b40fc812a5
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0 (1 ms)
[ RUN      ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1
Hash = SHA-384
Output: [48] 9998debf828df655a1cfa8be12065c8e65ec80a133ed610609c65c08cfc99139...
[       OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1 (0 ms)
[----------] 10 tests from AllHashFuncs/TlsHkdfTest (15 ms total)

[----------] Global test environment tear-down
[==========] 1021 tests from 40 test cases ran. (106549 ms total)
[  PASSED  ] 1021 tests.

  YOU HAVE 5 DISABLED TESTS

ssl_gtest.sh: #7285: ssl_gtest run successfully  - PASSED
'StreamOnly/TlsConnectStream: DISABLED_ClientAuthRequiredRejected/0 771' SKIPPED
'StreamOnly/TlsConnectStream: DISABLED_ClientAuthRequiredRejected/1 770' SKIPPED
'StreamOnly/TlsConnectStream: DISABLED_ClientAuthRequiredRejected/2 769' SKIPPED
'ExtensionTls12Plus/TlsExtensionTest12Plus: DISABLED_SignatureAlgorithmsSigUnsupported/0 (&quot;TLS&quot;, 771)' SKIPPED
'ExtensionTls12Plus/TlsExtensionTest12Plus: DISABLED_SignatureAlgorithmsSigUnsupported/1 (&quot;DTLS&quot;, 771)' SKIPPED
TIMESTAMP ssl_gtests END: Fri May 19 19:55:50 UTC 2017

SUMMARY:
========
NSS variables:
--------------
HOST=testbuildd
DOMSUF=(none)
BUILD_OPT=
USE_X32=
USE_64=
NSS_CYCLES="standard"
NSS_TESTS=""
NSS_SSL_TESTS="crl bypass_normal normal_bypass fips_normal normal_fips iopr policy"
NSS_SSL_RUN="cov auth stapling stress"
NSS_AIA_PATH=
NSS_AIA_HTTP=
NSS_AIA_OCSP=
IOPR_HOSTADDR_LIST=
PKITS_DATA=

Tests summary:
--------------
Passed:             8306
Failed:             0
Failed with core:   0
ASan failures:      0
Unknown status:     0

# Cleanup
rm -f dist/lib/*.chk
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
 fakeroot debian/rules binary-arch
dh binary-arch
   dh_testroot -a
   dh_prep -a
   dh_installdirs -a
   debian/rules override_dh_auto_install
make[1]: Entering directory `/<<PKGBUILDDIR>>'
sed 's,/@DEB_HOST_MULTIARCH@,/arm-linux-gnueabihf,g;' debian/libnss3-1d.links.in > debian/libnss3-1d.links
sed 's,/@DEB_HOST_MULTIARCH@,/arm-linux-gnueabihf,g;' debian/libnss3-dev.links.in > debian/libnss3-dev.links
sed 's,/@DEB_HOST_MULTIARCH@,/arm-linux-gnueabihf,g;s,/@DEB_HOST_MULTIARCH_WC@,/*,g' debian/libnss3.lintian-overrides.in > debian/libnss3.lintian-overrides
sed 's,/@DEB_HOST_MULTIARCH@,/arm-linux-gnueabihf,g;s/@MOD_MAJOR_VERSION@/3/;s/@MOD_MINOR_VERSION@/26/;s/@MOD_PATCH_VERSION@/0/' debian/nss-config.in > debian/nss-config
sed 's,/@DEB_HOST_MULTIARCH@,/arm-linux-gnueabihf,g;s/@VERSION@/3.26/' debian/nss.pc.in > debian/nss.pc
install -m 755 -d debian/libnss3/usr/lib/arm-linux-gnueabihf/nss debian/libnss3-dev/usr/lib/arm-linux-gnueabihf/pkgconfig
install -m 644 -t debian/libnss3/usr/lib/arm-linux-gnueabihf \
		/<<PKGBUILDDIR>>/dist/lib/libnss3.so \
		/<<PKGBUILDDIR>>/dist/lib/libnssutil3.so \
		/<<PKGBUILDDIR>>/dist/lib/libsmime3.so \
		/<<PKGBUILDDIR>>/dist/lib/libssl3.so
install -m 644 -t debian/libnss3/usr/lib/arm-linux-gnueabihf/nss \
		/<<PKGBUILDDIR>>/dist/lib/libfreebl3.so \
		/<<PKGBUILDDIR>>/dist/lib/libfreeblpriv3.so \
		/<<PKGBUILDDIR>>/dist/lib/libsoftokn3.so \
		/<<PKGBUILDDIR>>/dist/lib/libnssdbm3.so \
		/<<PKGBUILDDIR>>/dist/lib/libnssckbi.so
install -m 644 -t debian/libnss3-dev/usr/include/nss \
		/<<PKGBUILDDIR>>/dist/public/nss/*
install -m 644 -t debian/libnss3-dev/usr/lib/arm-linux-gnueabihf \
		/<<PKGBUILDDIR>>/dist/lib/libcrmf.a
install -m 644 -t debian/libnss3-dev/usr/lib/arm-linux-gnueabihf/pkgconfig debian/nss.pc
install -m 755 -t debian/libnss3-dev/usr/bin debian/nss-config
install -m 755 -t debian/libnss3-tools/usr/bin \
		 /<<PKGBUILDDIR>>/dist/bin/certutil  /<<PKGBUILDDIR>>/dist/bin/chktest  /<<PKGBUILDDIR>>/dist/bin/cmsutil  /<<PKGBUILDDIR>>/dist/bin/crlutil  /<<PKGBUILDDIR>>/dist/bin/derdump  /<<PKGBUILDDIR>>/dist/bin/httpserv  /<<PKGBUILDDIR>>/dist/bin/modutil  /<<PKGBUILDDIR>>/dist/bin/ocspclnt  /<<PKGBUILDDIR>>/dist/bin/p7content  /<<PKGBUILDDIR>>/dist/bin/p7env  /<<PKGBUILDDIR>>/dist/bin/p7sign  /<<PKGBUILDDIR>>/dist/bin/p7verify  /<<PKGBUILDDIR>>/dist/bin/pk12util  /<<PKGBUILDDIR>>/dist/bin/pk1sign  /<<PKGBUILDDIR>>/dist/bin/pwdecrypt  /<<PKGBUILDDIR>>/dist/bin/rsaperf  /<<PKGBUILDDIR>>/dist/bin/selfserv  /<<PKGBUILDDIR>>/dist/bin/shlibsign  /<<PKGBUILDDIR>>/dist/bin/signtool  /<<PKGBUILDDIR>>/dist/bin/signver  /<<PKGBUILDDIR>>/dist/bin/ssltap  /<<PKGBUILDDIR>>/dist/bin/strsclnt  /<<PKGBUILDDIR>>/dist/bin/symkeyutil  /<<PKGBUILDDIR>>/dist/bin/tstclnt  /<<PKGBUILDDIR>>/dist/bin/vfychain  /<<PKGBUILDDIR>>/dist/bin/vfyserv
# these utilities are too generically-named, so we prefix them with nss- (see http://bugs.debian.org/701141)
install -m 755 -T /<<PKGBUILDDIR>>/dist/bin/addbuiltin debian/libnss3-tools/usr/bin/nss-addbuiltin
install -m 755 -T /<<PKGBUILDDIR>>/dist/bin/dbtest debian/libnss3-tools/usr/bin/nss-dbtest
install -m 755 -T /<<PKGBUILDDIR>>/dist/bin/pp debian/libnss3-tools/usr/bin/nss-pp
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
   dh_install -a
   dh_installdocs -a
   dh_installchangelogs -a
   dh_installexamples -a
   dh_installman -a
   dh_installcatalogs -a
   dh_installcron -a
   dh_installdebconf -a
   dh_installemacsen -a
   dh_installifupdown -a
   dh_installinfo -a
   dh_installinit -a
   dh_installmenu -a
   dh_installmime -a
   dh_installmodules -a
   dh_installlogcheck -a
   dh_installlogrotate -a
   dh_installpam -a
   dh_installppp -a
   dh_installudev -a
   dh_installwm -a
   dh_installxfonts -a
   dh_installgsettings -a
   dh_bugfiles -a
   dh_ucf -a
   dh_lintian -a
   dh_gconf -a
   dh_icons -a
   dh_perl -a
   dh_usrlocal -a
   dh_link -a
   dh_compress -a
   dh_fixperms -a
   debian/rules override_dh_strip
make[1]: Entering directory `/<<PKGBUILDDIR>>'
dh_strip -a --dbg-package=libnss3-dbg
umask 022; LD_LIBRARY_PATH=debian/libnss3/usr/lib/arm-linux-gnueabihf debian/libnss3-tools/usr/bin/shlibsign -v -i debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libsoftokn3.so
ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored.
Library File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libsoftokn3.so 199592 bytes
Check File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libsoftokn3.chk
  hash: 32 bytes
    d8 de ab c1 88 39 87 7d c5 ae
    05 a6 b1 e3 ff 0c a9 6b 71 49
    88 d2 d4 08 22 e8 26 be b6 a6
    a9 04
  signature: 64 bytes
    33 b8 1b 17 11 38 5f ca 3d bd
    74 7a 4e 49 53 0e 2d c3 a6 a1
    9b 3d 20 54 c8 9f 44 31 f4 d0
    bb 6d 45 f1 a8 ac e0 93 69 1c
    98 34 26 eb d9 01 cd 28 69 ec
    49 8b 9e 01 52 5d ff d5 17 d9
    ea ad 95 74
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
umask 022; LD_LIBRARY_PATH=debian/libnss3/usr/lib/arm-linux-gnueabihf debian/libnss3-tools/usr/bin/shlibsign -v -i debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libfreebl3.so
ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored.
Library File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libfreebl3.so 9712 bytes
Check File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libfreebl3.chk
  hash: 32 bytes
    60 61 90 42 a6 e1 9b 67 08 2a
    c5 a0 90 07 65 36 8f 09 a2 6c
    6e 09 ec e1 8f 33 ea 42 04 f2
    46 b7
  signature: 64 bytes
    02 af 46 3c 68 50 9a 38 60 71
    cf 0c c3 d4 85 8b 78 dc dc 74
    e9 6b 81 c8 32 ae dd 7d c6 5f
    6a 1b 87 58 9b 6b 2f 14 ab 53
    9e ef 18 a4 2d ef fc 84 34 d2
    89 27 c8 dd d7 76 da a9 2c ee
    b4 10 bb 15
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
umask 022; LD_LIBRARY_PATH=debian/libnss3/usr/lib/arm-linux-gnueabihf debian/libnss3-tools/usr/bin/shlibsign -v -i debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libfreeblpriv3.so
ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored.
Library File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libfreeblpriv3.so 358456 bytes
Check File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libfreeblpriv3.chk
  hash: 32 bytes
    66 8b 8f 5f a2 d0 b1 e5 93 7a
    f3 69 67 c9 49 33 03 a0 8a 78
    f1 9b 48 8a b1 76 e4 36 fb c4
    96 f1
  signature: 64 bytes
    11 3f ec 35 7f 2b ea fc 26 7a
    82 48 96 1c e9 a5 10 2d 0d bb
    85 0d 7d 8a 86 5e 28 77 73 0e
    bd 75 6b 6a a9 df 62 29 cb f4
    21 e4 64 04 a7 72 69 3f c4 64
    84 c2 18 ba 43 b7 48 35 f0 c7
    ee 42 c3 6e
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
umask 022; LD_LIBRARY_PATH=debian/libnss3/usr/lib/arm-linux-gnueabihf debian/libnss3-tools/usr/bin/shlibsign -v -i debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libnssdbm3.so
ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored.
Library File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libnssdbm3.so 125068 bytes
Check File: debian/libnss3/usr/lib/arm-linux-gnueabihf/nss/libnssdbm3.chk
  hash: 32 bytes
    b8 5f 31 10 74 c2 51 8c ea d8
    ee 23 06 b9 b6 8d 9e ae 72 9a
    80 5c f4 f2 7b 8f 79 5f 08 a0
    ce e6
  signature: 64 bytes
    83 dc 5b e8 cd e0 fe 33 50 72
    ca 76 16 3e b1 9f a8 06 98 f9
    ba b5 2f ad 21 42 f5 4f 71 93
    86 64 6e 9a 28 ba f2 50 87 3e
    32 53 fd 20 00 3c 78 8a ff 85
    08 ac 18 2c 25 c0 ae 3c aa 65
    1e 14 46 c0
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
# Check FIPS mode correctly works
mkdir debian/tmp
LD_LIBRARY_PATH=debian/libnss3/usr/lib/arm-linux-gnueabihf:debian/libnss3/usr/lib/arm-linux-gnueabihf/nss debian/libnss3-tools/usr/bin/modutil -create -dbdir debian/tmp < /dev/null
ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored.

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
LD_LIBRARY_PATH=debian/libnss3/usr/lib/arm-linux-gnueabihf:debian/libnss3/usr/lib/arm-linux-gnueabihf/nss debian/libnss3-tools/usr/bin/modutil -fips true -dbdir debian/tmp < /dev/null
ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored.

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
FIPS mode enabled.
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
   debian/rules override_dh_makeshlibs
make[1]: Entering directory `/<<PKGBUILDDIR>>'
dh_makeshlibs -a -- -c4
cat /usr/share/debhelper/autoscripts/postinst-makeshlibs > debian/libnss3.postinst.debhelper
cat /usr/share/debhelper/autoscripts/postrm-makeshlibs > debian/libnss3.postrm.debhelper
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
   dh_shlibdeps -a
dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/libnss3-tools/usr/bin/cmsutil debian/libnss3-tools/usr/bin/nss-dbtest debian/libnss3-tools/usr/bin/pk1sign debian/libnss3-tools/usr/bin/certutil debian/libnss3-tools/usr/bin/ocspclnt debian/libnss3-tools/usr/bin/chktest debian/libnss3-tools/usr/bin/ssltap debian/libnss3-tools/usr/bin/selfserv debian/libnss3-tools/usr/bin/modutil debian/libnss3-tools/usr/bin/signver debian/libnss3-tools/usr/bin/nss-addbuiltin debian/libnss3-tools/usr/bin/signtool debian/libnss3-tools/usr/bin/strsclnt debian/libnss3-tools/usr/bin/httpserv debian/libnss3-tools/usr/bin/p7verify debian/libnss3-tools/usr/bin/nss-pp debian/libnss3-tools/usr/bin/symkeyutil debian/libnss3-tools/usr/bin/crlutil debian/libnss3-tools/usr/bin/p7sign debian/libnss3-tools/usr/bin/pwdecrypt debian/libnss3-tools/usr/bin/shlibsign debian/libnss3-tools/usr/bin/derdump debian/libnss3-tools/usr/bin/tstclnt debian/libnss3-tools/usr/bin/p7content debian/libnss3-tools/usr/bin/vfyserv debian/libnss3-tools/usr/bin/vfychain debian/libnss3-tools/usr/bin/rsaperf debian/libnss3-tools/usr/bin/pk12util debian/libnss3-tools/usr/bin/p7env were not linked against libdl.so.2 (they use none of the library's symbols)
dpkg-shlibdeps: warning: package could avoid a useless dependency if debian/libnss3-tools/usr/bin/chktest debian/libnss3-tools/usr/bin/rsaperf were not linked against libsqlite3.so.0 (they use none of the library's symbols)
   dh_installdeb -a
   debian/rules override_dh_gencontrol
make[1]: Entering directory `/<<PKGBUILDDIR>>'
dh_gencontrol -- -Vmisc:Multi-Arch=same
dpkg-gencontrol: warning: File::FcntlLock not available; using flock which is not NFS-safe
dpkg-gencontrol: warning: Pre-Depends field of package libnss3-1d: unknown substitution variable ${misc:Pre-Depends}
dpkg-gencontrol: warning: File::FcntlLock not available; using flock which is not NFS-safe
dpkg-gencontrol: warning: File::FcntlLock not available; using flock which is not NFS-safe
dpkg-gencontrol: warning: File::FcntlLock not available; using flock which is not NFS-safe
dpkg-gencontrol: warning: File::FcntlLock not available; using flock which is not NFS-safe
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
   dh_md5sums -a
   debian/rules override_dh_builddeb
make[1]: Entering directory `/<<PKGBUILDDIR>>'
dh_builddeb -- -Zxz
dpkg-deb: building package `libnss3-1d' in `../libnss3-1d_3.26-1+debu7u3_armhf.deb'.
dpkg-deb: building package `libnss3-dev' in `../libnss3-dev_3.26-1+debu7u3_armhf.deb'.
dpkg-deb: building package `libnss3-tools' in `../libnss3-tools_3.26-1+debu7u3_armhf.deb'.
dpkg-deb: building package `libnss3' in `../libnss3_3.26-1+debu7u3_armhf.deb'.
dpkg-deb: building package `libnss3-dbg' in `../libnss3-dbg_3.26-1+debu7u3_armhf.deb'.
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
 dpkg-genchanges -B -mRaspbian nitrogen6x test autobuilder <root@raspbian.org> >../nss_3.26-1+debu7u3_armhf.changes
dpkg-genchanges: arch-specific upload - not including arch-independent packages
dpkg-genchanges: binary-only upload - not including any source code
 dpkg-source --after-build nss-3.26
dpkg-buildpackage: binary only upload (no source included)
--------------------------------------------------------------------------------
Build finished at 2017-05-19T19:58:07Z

Finished
--------

I: Built successfully

+------------------------------------------------------------------------------+
| Post Build Chroot                                                            |
+------------------------------------------------------------------------------+


+------------------------------------------------------------------------------+
| Changes                                                                      |
+------------------------------------------------------------------------------+


nss_3.26-1+debu7u3_armhf.changes:
---------------------------------

Format: 1.8
Date: Fri, 19 May 2017 12:12:48 +0200
Source: nss
Binary: libnss3 libnss3-1d libnss3-tools libnss3-dev libnss3-dbg
Architecture: armhf
Version: 2:3.26-1+debu7u3
Distribution: wheezy-staging
Urgency: medium
Maintainer: Raspbian nitrogen6x test autobuilder <root@raspbian.org>
Changed-By: Raphaël Hertzog <hertzog@debian.org>
Description:
 libnss3    - Network Security Service libraries
 libnss3-1d - Network Security Service libraries - transitional package
 libnss3-dbg - Debugging symbols for the Network Security Service libraries
 libnss3-dev - Development files for the Network Security Service libraries
 libnss3-tools - Network Security Service tools
Changes:
 nss (2:3.26-1+debu7u3) wheezy-security; urgency=medium
 .
   * Non-maintainer upload by the LTS Security Team.
   * Add patches to fix two security issue:
     - CVE-2017-5461: Out-of-bounds write in Base64 encoding
     - CVE-2017-5462: DRBG flaw
Checksums-Sha1:
 1b488683baa23c8f51e7334c36fed4672f7bc96c 909682 libnss3_3.26-1+debu7u3_armhf.deb
 ebe98824e65ea9a25dd1145af3fb3d8f24afa472 18980 libnss3-1d_3.26-1+debu7u3_armhf.deb
 76a4008a2203a332b9dfd4b2c8fd7c7e7029fcf0 656858 libnss3-tools_3.26-1+debu7u3_armhf.deb
 1b32d51f438985c8262fa0e176d9b36328c5c9ef 226124 libnss3-dev_3.26-1+debu7u3_armhf.deb
 1e75b562930bfd35666fdb402c5ab335a8413660 8244684 libnss3-dbg_3.26-1+debu7u3_armhf.deb
Checksums-Sha256:
 2552c173b544dfb2168dc21f41b47c26be628d03372ee6c5bd19ba60a726b61b 909682 libnss3_3.26-1+debu7u3_armhf.deb
 3101c2e54b844f1fab2f3b03ac020e1c26521861e77c0c67ecee619f9e711654 18980 libnss3-1d_3.26-1+debu7u3_armhf.deb
 827169c123e16b824c3b31553f40b145d3fed1215c84cf2f10564816ff1a2b1b 656858 libnss3-tools_3.26-1+debu7u3_armhf.deb
 b136a6a5a51f582d2fd878f1e30ee0a78d0c0fef0f8dcc2c33de24c3063bcab9 226124 libnss3-dev_3.26-1+debu7u3_armhf.deb
 4599b8dde7e1ff31bfa2559eecdff6d7f0010aa1447f3443edaa247484e0f85f 8244684 libnss3-dbg_3.26-1+debu7u3_armhf.deb
Files:
 9747545132d618b6cdc4773168b381af 909682 libs optional libnss3_3.26-1+debu7u3_armhf.deb
 1f60cb5a4052bfc2ba92bcd93a0459df 18980 oldlibs extra libnss3-1d_3.26-1+debu7u3_armhf.deb
 f12b543e29688219eb236cf26deb8ef2 656858 admin optional libnss3-tools_3.26-1+debu7u3_armhf.deb
 a5ed4baf5c6532de98b0c7b351d0cd94 226124 libdevel optional libnss3-dev_3.26-1+debu7u3_armhf.deb
 20ee6b20af29ad1b4d91127e3e886f6a 8244684 debug extra libnss3-dbg_3.26-1+debu7u3_armhf.deb

+------------------------------------------------------------------------------+
| Package contents                                                             |
+------------------------------------------------------------------------------+


libnss3_3.26-1+debu7u3_armhf.deb
--------------------------------

 new debian package, version 2.0.
 size 909682 bytes: control archive=11410 bytes.
     791 bytes,    18 lines      control              
    1244 bytes,    16 lines      md5sums              
      62 bytes,     5 lines   *  postinst             #!/bin/sh
      59 bytes,     5 lines   *  postrm               #!/bin/sh
   65447 bytes,  1442 lines      symbols              
 Package: libnss3
 Source: nss
 Version: 2:3.26-1+debu7u3
 Architecture: armhf
 Maintainer: Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>
 Installed-Size: 2722
 Pre-Depends: multiarch-support
 Depends: libc6 (>= 2.13-28), libgcc1 (>= 1:4.4.0), libnspr4 (>= 2:4.12), libsqlite3-0 (>= 3.5.9), zlib1g (>= 1:1.1.4)
 Conflicts: libnss3-1d (<< 2:3.13.4-2)
 Section: libs
 Priority: optional
 Multi-Arch: same
 Homepage: http://www.mozilla.org/projects/security/pki/nss/
 Description: Network Security Service libraries
  This is a set of libraries designed to support cross-platform development
  of security-enabled client and server applications. It can support SSLv2
  and  v4, TLS, PKCS #5, #7, #11, #12, S/MIME, X.509 v3 certificates and
  other security standards.

drwxr-xr-x root/root         0 2017-05-19 19:56 ./
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/
drwxr-xr-x root/root         0 2017-05-19 19:55 ./usr/lib/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/
-rw-r--r-- root/root   1002364 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/libnss3.so
-rw-r--r-- root/root    133336 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/libnssutil3.so
-rw-r--r-- root/root    134400 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/libsmime3.so
-rw-r--r-- root/root    261352 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/libssl3.so
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/nss/
-rw-r--r-- root/root       899 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/nss/libfreebl3.chk
-rw-r--r-- root/root      9712 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/nss/libfreebl3.so
-rw-r--r-- root/root       899 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/nss/libfreeblpriv3.chk
-rw-r--r-- root/root    358456 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/nss/libfreeblpriv3.so
-rw-r--r-- root/root    456108 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/nss/libnssckbi.so
-rw-r--r-- root/root       899 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/nss/libnssdbm3.chk
-rw-r--r-- root/root    125068 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/nss/libnssdbm3.so
-rw-r--r-- root/root       899 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/nss/libsoftokn3.chk
-rw-r--r-- root/root    199592 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/nss/libsoftokn3.so
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/doc/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/doc/libnss3/
-rw-r--r-- root/root      9498 2017-05-19 10:12 ./usr/share/doc/libnss3/changelog.Debian.gz
-rw-r--r-- root/root     26092 2015-08-16 19:11 ./usr/share/doc/libnss3/copyright
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/lintian/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/lintian/overrides/
-rw-r--r-- root/root       708 2017-05-19 19:55 ./usr/share/lintian/overrides/libnss3


libnss3-1d_3.26-1+debu7u3_armhf.deb
-----------------------------------

 new debian package, version 2.0.
 size 18980 bytes: control archive=600 bytes.
     507 bytes,    14 lines      control              
     221 bytes,     3 lines      md5sums              
 Package: libnss3-1d
 Source: nss
 Version: 2:3.26-1+debu7u3
 Architecture: armhf
 Maintainer: Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>
 Installed-Size: 36
 Depends: libnss3 (= 2:3.26-1+debu7u3)
 Section: oldlibs
 Priority: extra
 Multi-Arch: same
 Homepage: http://www.mozilla.org/projects/security/pki/nss/
 Description: Network Security Service libraries - transitional package
  This is a transitional package to ensure smooth transition of all packages
  to libnss3.

drwxr-xr-x root/root         0 2017-05-19 19:56 ./
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/
lrwxrwxrwx root/root         0 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/libnss3.so.1d -> libnss3.so
lrwxrwxrwx root/root         0 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/libnssutil3.so.1d -> libnssutil3.so
lrwxrwxrwx root/root         0 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/libsmime3.so.1d -> libsmime3.so
lrwxrwxrwx root/root         0 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/libssl3.so.1d -> libssl3.so
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/doc/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/doc/libnss3-1d/
-rw-r--r-- root/root      9498 2017-05-19 10:12 ./usr/share/doc/libnss3-1d/changelog.Debian.gz
-rw-r--r-- root/root     26092 2015-08-16 19:11 ./usr/share/doc/libnss3-1d/copyright
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/lintian/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/lintian/overrides/
-rw-r--r-- root/root       165 2015-08-16 19:11 ./usr/share/lintian/overrides/libnss3-1d


libnss3-tools_3.26-1+debu7u3_armhf.deb
--------------------------------------

 new debian package, version 2.0.
 size 656858 bytes: control archive=1701 bytes.
    1112 bytes,    22 lines      control              
    1703 bytes,    32 lines      md5sums              
 Package: libnss3-tools
 Source: nss
 Version: 2:3.26-1+debu7u3
 Architecture: armhf
 Maintainer: Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>
 Installed-Size: 3188
 Depends: libc6 (>= 2.13-28), libgcc1 (>= 1:4.4.0), libnspr4 (>= 2:4.12), libnss3 (>= 2:3.26), libsqlite3-0 (>= 3.5.9), zlib1g (>= 1:1.1.4)
 Section: admin
 Priority: optional
 Homepage: http://www.mozilla.org/projects/security/pki/nss/tools/
 Description: Network Security Service tools
  This is a set of tools on top of the Network Security Service libraries.
  This package includes:
   * certutil: manages certificate and key databases (cert7.db and key3.db)
   * modutil: manages the database of PKCS11 modules (secmod.db)
   * pk12util: imports/exports keys and certificates between the cert/key
     databases and files in PKCS12 format.
   * shlibsign: creates .chk files for use in FIPS mode.
   * signtool: creates digitally-signed jar archives containing files and/or
     code.
   * ssltap: proxy requests for an SSL server and display the contents of
     the messages exchanged between the client and server.

drwxr-xr-x root/root         0 2017-05-19 19:56 ./
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/bin/
-rwxr-xr-x root/root    142280 2017-05-19 19:56 ./usr/bin/certutil
-rwxr-xr-x root/root     38648 2017-05-19 19:56 ./usr/bin/chktest
-rwxr-xr-x root/root     84468 2017-05-19 19:56 ./usr/bin/cmsutil
-rwxr-xr-x root/root     96712 2017-05-19 19:56 ./usr/bin/crlutil
-rwxr-xr-x root/root     63712 2017-05-19 19:56 ./usr/bin/derdump
-rwxr-xr-x root/root     76292 2017-05-19 19:56 ./usr/bin/httpserv
-rwxr-xr-x root/root    131024 2017-05-19 19:56 ./usr/bin/modutil
-rwxr-xr-x root/root     72096 2017-05-19 19:56 ./usr/bin/nss-addbuiltin
-rwxr-xr-x root/root     63772 2017-05-19 19:56 ./usr/bin/nss-dbtest
-rwxr-xr-x root/root     67840 2017-05-19 19:56 ./usr/bin/nss-pp
-rwxr-xr-x root/root     76108 2017-05-19 19:56 ./usr/bin/ocspclnt
-rwxr-xr-x root/root     63768 2017-05-19 19:56 ./usr/bin/p7content
-rwxr-xr-x root/root     63764 2017-05-19 19:56 ./usr/bin/p7env
-rwxr-xr-x root/root     63760 2017-05-19 19:56 ./usr/bin/p7sign
-rwxr-xr-x root/root     63752 2017-05-19 19:56 ./usr/bin/p7verify
-rwxr-xr-x root/root     72464 2017-05-19 19:56 ./usr/bin/pk12util
-rwxr-xr-x root/root     63828 2017-05-19 19:56 ./usr/bin/pk1sign
-rwxr-xr-x root/root     63756 2017-05-19 19:56 ./usr/bin/pwdecrypt
-rwxr-xr-x root/root   1027396 2017-05-19 19:56 ./usr/bin/rsaperf
-rwxr-xr-x root/root    101148 2017-05-19 19:56 ./usr/bin/selfserv
-rwxr-xr-x root/root     22264 2017-05-19 19:56 ./usr/bin/shlibsign
-rwxr-xr-x root/root    150264 2017-05-19 19:56 ./usr/bin/signtool
-rwxr-xr-x root/root     72132 2017-05-19 19:56 ./usr/bin/signver
-rwxr-xr-x root/root     96612 2017-05-19 19:56 ./usr/bin/ssltap
-rwxr-xr-x root/root     80560 2017-05-19 19:56 ./usr/bin/strsclnt
-rwxr-xr-x root/root     76652 2017-05-19 19:56 ./usr/bin/symkeyutil
-rwxr-xr-x root/root     84604 2017-05-19 19:56 ./usr/bin/tstclnt
-rwxr-xr-x root/root     72004 2017-05-19 19:56 ./usr/bin/vfychain
-rwxr-xr-x root/root     76416 2017-05-19 19:56 ./usr/bin/vfyserv
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/doc/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/doc/libnss3-tools/
-rw-r--r-- root/root      9498 2017-05-19 10:12 ./usr/share/doc/libnss3-tools/changelog.Debian.gz
-rw-r--r-- root/root     26092 2015-08-16 19:11 ./usr/share/doc/libnss3-tools/copyright
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/lintian/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/lintian/overrides/
-rw-r--r-- root/root       168 2015-08-16 19:11 ./usr/share/lintian/overrides/libnss3-tools


libnss3-dev_3.26-1+debu7u3_armhf.deb
------------------------------------

 new debian package, version 2.0.
 size 226124 bytes: control archive=3392 bytes.
     815 bytes,    19 lines      control              
    6261 bytes,   104 lines      md5sums              
 Package: libnss3-dev
 Source: nss
 Version: 2:3.26-1+debu7u3
 Architecture: armhf
 Maintainer: Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>
 Installed-Size: 1202
 Depends: libnss3 (= 2:3.26-1+debu7u3), libnspr4-dev (>= 2:4.12)
 Section: libdevel
 Priority: optional
 Multi-Arch: same
 Homepage: http://www.mozilla.org/projects/security/pki/nss/
 Description: Development files for the Network Security Service libraries
  This is a set of libraries designed to support cross-platform development
  of security-enabled client and server applications. It can support SSLv2
  and  v4, TLS, PKCS #5, #7, #11, #12, S/MIME, X.509 v3 certificates and
  other security standards.
  .
  Install this package if you wish to develop your own programs using the
  Network Security Service Libraries.

drwxr-xr-x root/root         0 2017-05-19 19:56 ./
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/
drwxr-xr-x root/root         0 2017-05-19 19:55 ./usr/bin/
-rwxr-xr-x root/root      2364 2017-05-19 19:55 ./usr/bin/nss-config
drwxr-xr-x root/root         0 2017-05-19 19:55 ./usr/include/
drwxr-xr-x root/root         0 2017-05-19 19:55 ./usr/include/nss/
-rw-r--r-- root/root      1155 2017-05-19 19:55 ./usr/include/nss/base64.h
-rw-r--r-- root/root     12336 2017-05-19 19:55 ./usr/include/nss/blapit.h
-rw-r--r-- root/root     60117 2017-05-19 19:55 ./usr/include/nss/cert.h
-rw-r--r-- root/root      3196 2017-05-19 19:55 ./usr/include/nss/certdb.h
-rw-r--r-- root/root     47055 2017-05-19 19:55 ./usr/include/nss/certt.h
-rw-r--r-- root/root      2354 2017-05-19 19:55 ./usr/include/nss/ciferfam.h
-rw-r--r-- root/root     43207 2017-05-19 19:55 ./usr/include/nss/cmmf.h
-rw-r--r-- root/root      2303 2017-05-19 19:55 ./usr/include/nss/cmmft.h
-rw-r--r-- root/root     38735 2017-05-19 19:55 ./usr/include/nss/cms.h
-rw-r--r-- root/root       879 2017-05-19 19:55 ./usr/include/nss/cmsreclist.h
-rw-r--r-- root/root     17294 2017-05-19 19:55 ./usr/include/nss/cmst.h
-rw-r--r-- root/root     64432 2017-05-19 19:55 ./usr/include/nss/crmf.h
-rw-r--r-- root/root      5457 2017-05-19 19:55 ./usr/include/nss/crmft.h
-rw-r--r-- root/root     15438 2017-05-19 19:55 ./usr/include/nss/cryptohi.h
-rw-r--r-- root/root       426 2017-05-19 19:55 ./usr/include/nss/cryptoht.h
-rw-r--r-- root/root      4974 2017-05-19 19:55 ./usr/include/nss/ecl-exp.h
-rw-r--r-- root/root      1711 2017-05-19 19:55 ./usr/include/nss/hasht.h
-rw-r--r-- root/root      1964 2017-05-19 19:55 ./usr/include/nss/jar-ds.h
-rw-r--r-- root/root     10148 2017-05-19 19:55 ./usr/include/nss/jar.h
-rw-r--r-- root/root      1704 2017-05-19 19:55 ./usr/include/nss/jarfile.h
-rw-r--r-- root/root       347 2017-05-19 19:55 ./usr/include/nss/key.h
-rw-r--r-- root/root      8465 2017-05-19 19:55 ./usr/include/nss/keyhi.h
-rw-r--r-- root/root       284 2017-05-19 19:55 ./usr/include/nss/keyt.h
-rw-r--r-- root/root      7252 2017-05-19 19:55 ./usr/include/nss/keythi.h
-rw-r--r-- root/root      2291 2017-05-19 19:55 ./usr/include/nss/lowkeyi.h
-rw-r--r-- root/root      2573 2017-05-19 19:55 ./usr/include/nss/lowkeyti.h
-rw-r--r-- root/root     13458 2017-05-19 19:55 ./usr/include/nss/nss.h
-rw-r--r-- root/root      3112 2017-05-19 19:55 ./usr/include/nss/nssb64.h
-rw-r--r-- root/root       466 2017-05-19 19:55 ./usr/include/nss/nssb64t.h
-rw-r--r-- root/root      6703 2017-05-19 19:55 ./usr/include/nss/nssbase.h
-rw-r--r-- root/root      2670 2017-05-19 19:55 ./usr/include/nss/nssbaset.h
-rw-r--r-- root/root     42205 2017-05-19 19:55 ./usr/include/nss/nssck.api
-rw-r--r-- root/root      2171 2017-05-19 19:55 ./usr/include/nss/nssckbi.h
-rw-r--r-- root/root       320 2017-05-19 19:55 ./usr/include/nss/nssckepv.h
-rw-r--r-- root/root       327 2017-05-19 19:55 ./usr/include/nss/nssckft.h
-rw-r--r-- root/root      7235 2017-05-19 19:55 ./usr/include/nss/nssckfw.h
-rw-r--r-- root/root     17113 2017-05-19 19:55 ./usr/include/nss/nssckfwc.h
-rw-r--r-- root/root      2034 2017-05-19 19:55 ./usr/include/nss/nssckfwt.h
-rw-r--r-- root/root       314 2017-05-19 19:55 ./usr/include/nss/nssckg.h
-rw-r--r-- root/root     64748 2017-05-19 19:55 ./usr/include/nss/nssckmdt.h
-rw-r--r-- root/root       366 2017-05-19 19:55 ./usr/include/nss/nssckt.h
-rw-r--r-- root/root      6038 2017-05-19 19:55 ./usr/include/nss/nssilckt.h
-rw-r--r-- root/root      8280 2017-05-19 19:55 ./usr/include/nss/nssilock.h
-rw-r--r-- root/root       380 2017-05-19 19:55 ./usr/include/nss/nsslocks.h
-rw-r--r-- root/root      1227 2017-05-19 19:55 ./usr/include/nss/nsslowhash.h
-rw-r--r-- root/root      4952 2017-05-19 19:55 ./usr/include/nss/nssrwlk.h
-rw-r--r-- root/root       534 2017-05-19 19:55 ./usr/include/nss/nssrwlkt.h
-rw-r--r-- root/root       981 2017-05-19 19:55 ./usr/include/nss/nssutil.h
-rw-r--r-- root/root     28869 2017-05-19 19:55 ./usr/include/nss/ocsp.h
-rw-r--r-- root/root     12511 2017-05-19 19:55 ./usr/include/nss/ocspt.h
-rw-r--r-- root/root      9227 2017-05-19 19:55 ./usr/include/nss/p12.h
-rw-r--r-- root/root       755 2017-05-19 19:55 ./usr/include/nss/p12plcy.h
-rw-r--r-- root/root      4483 2017-05-19 19:55 ./usr/include/nss/p12t.h
-rw-r--r-- root/root       494 2017-05-19 19:55 ./usr/include/nss/pk11func.h
-rw-r--r-- root/root      6353 2017-05-19 19:55 ./usr/include/nss/pk11pqg.h
-rw-r--r-- root/root      8396 2017-05-19 19:55 ./usr/include/nss/pk11priv.h
-rw-r--r-- root/root     43336 2017-05-19 19:55 ./usr/include/nss/pk11pub.h
-rw-r--r-- root/root       731 2017-05-19 19:55 ./usr/include/nss/pk11sdr.h
-rw-r--r-- root/root      7444 2017-05-19 19:55 ./usr/include/nss/pkcs11.h
-rw-r--r-- root/root     28017 2017-05-19 19:55 ./usr/include/nss/pkcs11f.h
-rw-r--r-- root/root     19636 2017-05-19 19:55 ./usr/include/nss/pkcs11n.h
-rw-r--r-- root/root       774 2017-05-19 19:55 ./usr/include/nss/pkcs11p.h
-rw-r--r-- root/root     67880 2017-05-19 19:55 ./usr/include/nss/pkcs11t.h
-rw-r--r-- root/root       615 2017-05-19 19:55 ./usr/include/nss/pkcs11u.h
-rw-r--r-- root/root      1342 2017-05-19 19:55 ./usr/include/nss/pkcs12.h
-rw-r--r-- root/root     11236 2017-05-19 19:55 ./usr/include/nss/pkcs12t.h
-rw-r--r-- root/root      1202 2017-05-19 19:55 ./usr/include/nss/pkcs1sig.h
-rw-r--r-- root/root      8730 2017-05-19 19:55 ./usr/include/nss/pkcs7t.h
-rw-r--r-- root/root      3097 2017-05-19 19:55 ./usr/include/nss/portreg.h
-rw-r--r-- root/root      3839 2017-05-19 19:55 ./usr/include/nss/preenc.h
-rw-r--r-- root/root     11707 2017-05-19 19:55 ./usr/include/nss/secasn1.h
-rw-r--r-- root/root     10441 2017-05-19 19:55 ./usr/include/nss/secasn1t.h
-rw-r--r-- root/root      2163 2017-05-19 19:55 ./usr/include/nss/seccomon.h
-rw-r--r-- root/root      5958 2017-05-19 19:55 ./usr/include/nss/secder.h
-rw-r--r-- root/root      3934 2017-05-19 19:55 ./usr/include/nss/secdert.h
-rw-r--r-- root/root      3208 2017-05-19 19:55 ./usr/include/nss/secdig.h
-rw-r--r-- root/root       631 2017-05-19 19:55 ./usr/include/nss/secdigt.h
-rw-r--r-- root/root     13622 2017-05-19 19:55 ./usr/include/nss/secerr.h
-rw-r--r-- root/root      1719 2017-05-19 19:55 ./usr/include/nss/sechash.h
-rw-r--r-- root/root      4360 2017-05-19 19:55 ./usr/include/nss/secitem.h
-rw-r--r-- root/root      6745 2017-05-19 19:55 ./usr/include/nss/secmime.h
-rw-r--r-- root/root      7132 2017-05-19 19:55 ./usr/include/nss/secmod.h
-rw-r--r-- root/root     15811 2017-05-19 19:55 ./usr/include/nss/secmodt.h
-rw-r--r-- root/root      4709 2017-05-19 19:55 ./usr/include/nss/secoid.h
-rw-r--r-- root/root     19431 2017-05-19 19:55 ./usr/include/nss/secoidt.h
-rw-r--r-- root/root      2032 2017-05-19 19:55 ./usr/include/nss/secpkcs5.h
-rw-r--r-- root/root     22784 2017-05-19 19:55 ./usr/include/nss/secpkcs7.h
-rw-r--r-- root/root      9699 2017-05-19 19:55 ./usr/include/nss/secport.h
-rw-r--r-- root/root       446 2017-05-19 19:55 ./usr/include/nss/shsign.h
-rw-r--r-- root/root      5442 2017-05-19 19:55 ./usr/include/nss/smime.h
-rw-r--r-- root/root     62001 2017-05-19 19:55 ./usr/include/nss/ssl.h
-rw-r--r-- root/root     13023 2017-05-19 19:55 ./usr/include/nss/sslerr.h
-rw-r--r-- root/root     14324 2017-05-19 19:55 ./usr/include/nss/sslproto.h
-rw-r--r-- root/root     10060 2017-05-19 19:55 ./usr/include/nss/sslt.h
-rw-r--r-- root/root      1642 2017-05-19 19:55 ./usr/include/nss/utilmodt.h
-rw-r--r-- root/root      2946 2017-05-19 19:55 ./usr/include/nss/utilpars.h
-rw-r--r-- root/root      2993 2017-05-19 19:55 ./usr/include/nss/utilparst.h
-rw-r--r-- root/root      8662 2017-05-19 19:55 ./usr/include/nss/utilrename.h
drwxr-xr-x root/root         0 2017-05-19 19:55 ./usr/lib/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/
-rw-r--r-- root/root    111362 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/libcrmf.a
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/pkgconfig/
-rw-r--r-- root/root       276 2017-05-19 19:55 ./usr/lib/arm-linux-gnueabihf/pkgconfig/nss.pc
lrwxrwxrwx root/root         0 2017-05-19 19:56 ./usr/lib/arm-linux-gnueabihf/pkgconfig/xulrunner-nss.pc -> nss.pc
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/doc/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/doc/libnss3-dev/
-rw-r--r-- root/root      9498 2017-05-19 10:12 ./usr/share/doc/libnss3-dev/changelog.Debian.gz
-rw-r--r-- root/root     26092 2015-08-16 19:11 ./usr/share/doc/libnss3-dev/copyright
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/lintian/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/lintian/overrides/
-rw-r--r-- root/root       166 2015-08-16 19:11 ./usr/share/lintian/overrides/libnss3-dev


libnss3-dbg_3.26-1+debu7u3_armhf.deb
------------------------------------

 new debian package, version 2.0.
 size 8244684 bytes: control archive=2676 bytes.
     943 bytes,    20 lines      control              
    4252 bytes,    41 lines      md5sums              
 Package: libnss3-dbg
 Source: nss
 Version: 2:3.26-1+debu7u3
 Architecture: armhf
 Maintainer: Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>
 Installed-Size: 9855
 Depends: libnss3 (= 2:3.26-1+debu7u3) | libnss3-tools (= 2:3.26-1+debu7u3)
 Conflicts: libnss3 (>> 2:3.26-1+debu7u3), libnss3 (<< 2:3.26-1+debu7u3), libnss3-tools (>> 2:3.26-1+debu7u3), libnss3-tools (<< 2:3.26-1+debu7u3)
 Provides: libnss3-1d-dbg
 Section: debug
 Priority: extra
 Multi-Arch: same
 Homepage: http://www.mozilla.org/projects/security/pki/nss/
 Description: Debugging symbols for the Network Security Service libraries
  This is a set of libraries designed to support cross-platform development
  of security-enabled client and server applications. It can support SSLv2
  and  v4, TLS, PKCS #5, #7, #11, #12, S/MIME, X.509 v3 certificates and
  other security standards.
  .
  This package provides the debugging symbols for the library.

drwxr-xr-x root/root         0 2017-05-19 19:56 ./
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/00/
-rw-r--r-- root/root    184047 2017-05-19 19:56 ./usr/lib/debug/.build-id/00/e8f852625350c70224656800a40a594fe66ed5.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/07/
-rw-r--r-- root/root    135569 2017-05-19 19:56 ./usr/lib/debug/.build-id/07/50b259790d6d136ee080af1abcd229b99593a7.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/0f/
-rw-r--r-- root/root     80847 2017-05-19 19:56 ./usr/lib/debug/.build-id/0f/43adec411eec94bed50f61d49dec874d61ab1f.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/17/
-rw-r--r-- root/root    137081 2017-05-19 19:56 ./usr/lib/debug/.build-id/17/28b3f962ae5375ba89cd126053b5bc4b3d3926.debug
-rw-r--r-- root/root    123706 2017-05-19 19:56 ./usr/lib/debug/.build-id/17/d51b58a6dcbd5ca9cd65a95e5ae7c2df082153.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/18/
-rw-r--r-- root/root    133737 2017-05-19 19:56 ./usr/lib/debug/.build-id/18/778760dfd2ec06886ebd2377b14724f7cbb01b.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/1a/
-rw-r--r-- root/root    110709 2017-05-19 19:56 ./usr/lib/debug/.build-id/1a/9c149ea45b3b8165952ae81215d4bafcc7dc26.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/1e/
-rw-r--r-- root/root    112774 2017-05-19 19:56 ./usr/lib/debug/.build-id/1e/5577fb3a998bdb6d7750c7ebb0aa3002b9834c.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/23/
-rw-r--r-- root/root    117012 2017-05-19 19:56 ./usr/lib/debug/.build-id/23/3026e29f7ceb31db5b0d2b62feccfdf0530231.debug
-rw-r--r-- root/root    136220 2017-05-19 19:56 ./usr/lib/debug/.build-id/23/9016885afe6b68a8b5cbbe28b330ae6626ac95.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/28/
-rw-r--r-- root/root    128985 2017-05-19 19:56 ./usr/lib/debug/.build-id/28/99570469f1eb6cbe84e820e93019b54f2f7031.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/2c/
-rw-r--r-- root/root    278503 2017-05-19 19:56 ./usr/lib/debug/.build-id/2c/b015503d30ef1b9941ead2fafe079005a0c6c9.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/3d/
-rw-r--r-- root/root     19271 2017-05-19 19:56 ./usr/lib/debug/.build-id/3d/9aa69c0de1eb3c4320a3c3158545d5e8d07678.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/3e/
-rw-r--r-- root/root    161044 2017-05-19 19:56 ./usr/lib/debug/.build-id/3e/64cd10f1fcbb515fc57b5e8add5e0300456aec.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/4f/
-rw-r--r-- root/root    113278 2017-05-19 19:56 ./usr/lib/debug/.build-id/4f/d8af33bde618f830f82e7dc24161185fbcd083.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/56/
-rw-r--r-- root/root    131757 2017-05-19 19:56 ./usr/lib/debug/.build-id/56/ee14df4f7d2ce3ee44de02ab663b1da07959ff.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/59/
-rw-r--r-- root/root    149514 2017-05-19 19:56 ./usr/lib/debug/.build-id/59/403ce4ae89a13ea2b0743e7eafe82abf644b39.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/5d/
-rw-r--r-- root/root    111460 2017-05-19 19:56 ./usr/lib/debug/.build-id/5d/4f153373e570c4e8aedbb222f66412a370f675.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/66/
-rw-r--r-- root/root    131433 2017-05-19 19:56 ./usr/lib/debug/.build-id/66/d10f2f1e14470440c18eedba29b9e2f1c5e166.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/68/
-rw-r--r-- root/root    225038 2017-05-19 19:56 ./usr/lib/debug/.build-id/68/eb8d5e88a0f36b271844aaa072c3c471730edf.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/6f/
-rw-r--r-- root/root     25870 2017-05-19 19:56 ./usr/lib/debug/.build-id/6f/587404198a3fcb3e5ab8749bd3028282e7d575.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/79/
-rw-r--r-- root/root    228116 2017-05-19 19:56 ./usr/lib/debug/.build-id/79/376266fc0890db5e997b765d6bb01695565764.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/85/
-rw-r--r-- root/root    122115 2017-05-19 19:56 ./usr/lib/debug/.build-id/85/9de2d6f157c344e971269535551de964a19dee.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/89/
-rw-r--r-- root/root    115013 2017-05-19 19:56 ./usr/lib/debug/.build-id/89/2661ebe55b5cc3fe95c2aa9cb87b759cf24a7a.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/8b/
-rw-r--r-- root/root    113681 2017-05-19 19:56 ./usr/lib/debug/.build-id/8b/bb4d4856b0d28a82446f029fba2eb6eaa1500e.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/95/
-rw-r--r-- root/root    256087 2017-05-19 19:56 ./usr/lib/debug/.build-id/95/de4deaeb7190a127818e7dff6a61fe1315cafc.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/a1/
-rw-r--r-- root/root    124908 2017-05-19 19:56 ./usr/lib/debug/.build-id/a1/93d6392a39fe8b46f731ab4ffddfb2888d5c54.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/a4/
-rw-r--r-- root/root    114346 2017-05-19 19:56 ./usr/lib/debug/.build-id/a4/02b497bf024eb8716f45637dab321809ca8b7b.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/a5/
-rw-r--r-- root/root    581589 2017-05-19 19:56 ./usr/lib/debug/.build-id/a5/f61e919429e9d2d1e0c458839984cfc977706a.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/c4/
-rw-r--r-- root/root   2015082 2017-05-19 19:56 ./usr/lib/debug/.build-id/c4/6fc99c3ebb9d84dc8e1e280c55ba49cfab70dd.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/c5/
-rw-r--r-- root/root    371532 2017-05-19 19:56 ./usr/lib/debug/.build-id/c5/3b8d3d65e81e735d27ed601309486b46413535.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/c8/
-rw-r--r-- root/root    439098 2017-05-19 19:56 ./usr/lib/debug/.build-id/c8/8a4687f7871b56106696eae60a8a397525ef84.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/e4/
-rw-r--r-- root/root   1894422 2017-05-19 19:56 ./usr/lib/debug/.build-id/e4/044fab5018189d2f5f7b42177c5a39dadcc204.debug
-rw-r--r-- root/root    366871 2017-05-19 19:56 ./usr/lib/debug/.build-id/e4/95becb5a2eb2f378fb9e90357ccb565a7bc839.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/ec/
-rw-r--r-- root/root    196824 2017-05-19 19:56 ./usr/lib/debug/.build-id/ec/8fa63479d513a348f630a167fa207e7406c6a8.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/f0/
-rw-r--r-- root/root    113806 2017-05-19 19:56 ./usr/lib/debug/.build-id/f0/c3a390cdf08bb4d99901e5e3bf304848cd7cf5.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/f1/
-rw-r--r-- root/root    114178 2017-05-19 19:56 ./usr/lib/debug/.build-id/f1/b621aa6dcdddaec4493e6e6aed3d8438b64124.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/lib/debug/.build-id/f3/
-rw-r--r-- root/root    136015 2017-05-19 19:56 ./usr/lib/debug/.build-id/f3/7a242b17c4174a72dfa3456bb9fbf8b68e9fa3.debug
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/doc/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/doc/libnss3-dbg/
-rw-r--r-- root/root      9498 2017-05-19 10:12 ./usr/share/doc/libnss3-dbg/changelog.Debian.gz
-rw-r--r-- root/root     26092 2015-08-16 19:11 ./usr/share/doc/libnss3-dbg/copyright
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/lintian/
drwxr-xr-x root/root         0 2017-05-19 19:56 ./usr/share/lintian/overrides/
-rw-r--r-- root/root       166 2015-08-16 19:11 ./usr/share/lintian/overrides/libnss3-dbg


+------------------------------------------------------------------------------+
| Post Build                                                                   |
+------------------------------------------------------------------------------+


+------------------------------------------------------------------------------+
| Cleanup                                                                      |
+------------------------------------------------------------------------------+

Purging /<<BUILDDIR>>
Not cleaning session: cloned chroot in use

+------------------------------------------------------------------------------+
| Summary                                                                      |
+------------------------------------------------------------------------------+

Build Architecture: armhf
Build-Space: 331368
Build-Time: 12960
Distribution: wheezy-staging
Host Architecture: armhf
Install-Time: 436
Job: nss_2:3.26-1+debu7u3
Machine Architecture: armhf
Package: nss
Package-Time: 13451
Source-Version: 2:3.26-1+debu7u3
Space: 331368
Status: successful
Version: 2:3.26-1+debu7u3
--------------------------------------------------------------------------------
Finished at 2017-05-19T19:58:07Z
Build needed 03:44:11, 331368k disc space